Sciweavers

1486 search results - page 127 / 298
» Firewall Rules Analysis
Sort
View
BROADNETS
2005
IEEE
15 years 9 months ago
Performance analysis and enhancement for backbone based wireless mobile ad hoc networks
—In this paper, we present an extended Mobile Backbone Network (MBN) topology synthesis algorithm (ETSA) for constructing and maintaining a dynamic backbone structure in mobile w...
Laura Huei-jiun Ju, Izhak Rubin
115
Voted
CSB
2005
IEEE
140views Bioinformatics» more  CSB 2005»
15 years 9 months ago
TPR Packing Analysis and 3D Modeling for the HAT Domain of Human Crooked Neck Protein
Human crooked neck protein (hcrn) containing 17 HAT or TPR repeats plays a role in pre-mRNA processing. Conserved residues in the TPR consensus sequence of 34 aa were found at hel...
Zhenglin Hou, Cunxi Wang, Odd-Arne Olsen
126
Voted
DOLAP
2004
ACM
15 years 9 months ago
An analysis of additivity in OLAP systems
Accurate summary data is of paramount concern in data warehouse systems; however, there have been few attempts to completely characterize the ability to summarize measures. The su...
John Horner, Il-Yeol Song, Peter P. Chen
ICDS
2010
IEEE
15 years 9 months ago
Modeling and Analysis of Laws Using BPR and Goal-Oriented Framework
Abstract—Recently, two complementary approaches are proposed to represent, model and analyze laws: the Nomos and VLPM approaches. Nomos is a goal-oriented approach to effectively...
Adolfo Villafiorita, Komminist Weldemariam, Angelo...
ICWSM
2008
15 years 5 months ago
Preliminary Semantic Analysis of Political Blogs
In this paper, we present a series of semantic analyses of words in political blogs in the setting of categorization of two opposite political orientations: liberal vs. conservati...
Maojin Jiang, Shlomo Argamon