Sciweavers

26354 search results - page 5144 / 5271
» How we refactor, and how we know it
Sort
View
BMCBI
2004
150views more  BMCBI 2004»
15 years 1 months ago
Cross-species comparison significantly improves genome-wide prediction of cis-regulatory modules in Drosophila
Background: The discovery of cis-regulatory modules in metazoan genomes is crucial for understanding the connection between genes and organism diversity. It is important to quanti...
Saurabh Sinha, Mark D. Schroeder, Ulrich Unnerstal...
ETT
2002
89views Education» more  ETT 2002»
15 years 1 months ago
Delay analysis of a probabilistic priority discipline
In computer networks, the Strict Priority (SP) discipline is perhaps the most common and simplest method to schedule packets from different classes of applications, each with diver...
Yuming Jiang, Chen-Khong Tham, Chi Chung Ko
CGA
1998
15 years 1 months ago
Composite Lighting Simulations with Lighting Networks
A whole variety of different techniques for simulating global illumination in virtual environments have been developed over recent years. Each technique, including Radiosity, Mont...
Philipp Slusallek, Marc Stamminger, Wolfgang Heidr...
AAMAS
1999
Springer
15 years 1 months ago
Fully Embodied Conversational Avatars: Making Communicative Behaviors Autonomous
: Although avatars may resemble communicative interface agents, they have for the most part not profited from recent research into autonomous embodied conversational systems. In pa...
Justine Cassell, Hannes Högni Vilhjálm...
AIS
1999
Springer
15 years 1 months ago
Preserving communication context: Virtual workspace and interpersonal space in Japanese CSCW
The past decade has seen the development of a perspective holding that technology is socially constructed (Mackenzie and Wacjman, 1985; Bijker, Hughes and Pinch, 1987; Bijker and L...
Lorna Heaton
« Prev « First page 5144 / 5271 Last » Next »