Sciweavers

2757 search results - page 318 / 552
» Empirical investigations of conceptual modeling and the mode...
Sort
View
ACSW
2003
15 years 3 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
BMCBI
2005
112views more  BMCBI 2005»
15 years 1 months ago
"Harshlighting" small blemishes on microarrays
Background: Microscopists are familiar with many blemishes that fluorescence images can have due to dust and debris, glass flaws, uneven distribution of fluids or surface coatings...
Mayte Suárez-Fariñas, Asifa Haider, ...
134
Voted
DFG
2004
Springer
15 years 5 months ago
Verification of PLC Programs Given as Sequential Function Charts
Programmable Logic Controllers (PLC) are widespread in the manufacturing and processing industries to realize sequential procedures and to avoid safety-critical states. For the spe...
Nanette Bauer, Sebastian Engell, Ralf Huuck, Sven ...
MOBISYS
2004
ACM
16 years 1 months ago
Impact of Radio Irregularity on Wireless Sensor Networks
In this paper, we investigate the impact of radio irregularity on the communication performance in wireless sensor networks. Radio irregularity is a common phenomenon which arises...
Gang Zhou, Tian He, Sudha Krishnamurthy, John A. S...
ILP
2007
Springer
15 years 8 months ago
Bias/Variance Analysis for Relational Domains
Bias/variance analysis is a useful tool for investigating the performance of machine learning algorithms. Conventional analysis decomposes loss into errors due to aspects of the le...
Jennifer Neville, David Jensen