Sciweavers

24529 search results - page 4698 / 4906
» Computing on Authenticated Data
Sort
View
JIB
2006
78views more  JIB 2006»
15 years 3 months ago
Identification of embryo specific human isoforms using a database of predicted alternative splice forms
Alternative splicing is one of the most important mechanisms to generate a large number of mRNA and protein isoforms from a small number of genes. Its study became one of the hot ...
Heike Pospisil
PERCOM
2008
ACM
15 years 3 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
PAMI
2006
186views more  PAMI 2006»
15 years 3 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
PERVASIVE
2006
Springer
15 years 3 months ago
Building Reliable Activity Models Using Hierarchical Shrinkage and Mined Ontology
Abstract. Activity inference based on object use has received considerable recent attention. Such inference requires statistical models that map activities to the objects used in p...
Emmanuel Munguia Tapia, Tanzeem Choudhury, Matthai...
SCP
2008
128views more  SCP 2008»
15 years 3 months ago
Mobile JikesRVM: A framework to support transparent Java thread migration
Today's complex applications must face the distribution of data and code among different network nodes. Computation in distributed contexts is demanding increasingly powerful...
Raffaele Quitadamo, Giacomo Cabri, Letizia Leonard...
« Prev « First page 4698 / 4906 Last » Next »