Sciweavers

2616 search results - page 476 / 524
» Knowledge Management
Sort
View
ISF
2008
114views more  ISF 2008»
15 years 3 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
PR
2008
97views more  PR 2008»
15 years 3 months ago
A vision-based method for weeds identification through the Bayesian decision theory
One of the objectives of precision agriculture is to minimize the volume of herbicides that are applied to the fields through the use of site-specific weed management systems. Thi...
Alberto Tellaeche, Xavier P. Burgos-Artizzu, Gonza...
BMCBI
2008
184views more  BMCBI 2008»
15 years 2 months ago
"TOF2H": A precision toolbox for rapid, high density/high coverage hydrogen-deuterium exchange mass spectrometry via an LC-MALDI
Background: Protein-amide proton hydrogen-deuterium exchange (HDX) is used to investigate protein conformation, conformational changes and surface binding sites for other molecule...
Pornpat Nikamanon, Elroy Pun, Wayne Chou, Marek D....
EMSOFT
2010
Springer
15 years 1 months ago
Power-aware temporal isolation with variable-bandwidth servers
Variable-bandwidth servers (VBS) control process execution speed by allocating variable CPU bandwidth to processes. VBS enables temporal isolation of EDF-scheduled processes in th...
Silviu S. Craciunas, Christoph M. Kirsch, Ana Soko...
JCAL
2011
89views more  JCAL 2011»
14 years 6 months ago
What if undergraduate students designed their own web learning environment? Exploring students' web 2.0 mentality through partic
Following the increasing calls for a more skeptical analysis of web 2.0 and the empowerment of learners’ voices in formulating upcoming technologies, this paper elaborates on the...
George Palaigeorgiou, George Triantafyllakos, Avgo...