Sciweavers

20833 search results - page 3979 / 4167
» Hidden process models
Sort
View
CLUSTER
2003
IEEE
15 years 9 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
CSB
2003
IEEE
176views Bioinformatics» more  CSB 2003»
15 years 9 months ago
3D Structural Homology Detection via Unassigned Residual Dipolar Couplings
Recognition of a protein’s fold provides valuable information about its function. While many sequence-based homology prediction methods exist, an important challenge remains: tw...
Christopher James Langmead, Bruce Randall Donald
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 9 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 9 months ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole
HICSS
2003
IEEE
201views Biometrics» more  HICSS 2003»
15 years 9 months ago
Design and Evaluation of Improvement method on the Web Information Navigation - A Stochastic Search Approach
With the advent of fast growing Internet and World Wide Web (WWW), more and more companies start the electronic commerce to enhance the business competitiveness. On the other hand...
Benjamin P.-C. Yen, Y.-W. Wan
« Prev « First page 3979 / 4167 Last » Next »