Sciweavers

6199 search results - page 1202 / 1240
» Monitoring the
Sort
View
WINET
2008
200views more  WINET 2008»
14 years 9 months ago
Performance evaluation of an IEEE 802.15.4 sensor network with a star topology
One class of applications envisaged for the IEEE 802.15.4 LR-WPAN (low data rate - wireless personal area network) standard is wireless sensor networks for monitoring and control a...
Chandramani Kishore Singh, Anurag Kumar, P. M. Ame...
AIM
2002
14 years 9 months ago
Electric Elves: Agent Technology for Supporting Human Organizations
The operation of a human organization requires dozens of everyday tasks to ensure coherence in organizational activities, to monitor the status of such activities, to gather infor...
Hans Chalupsky, Yolanda Gil, Craig A. Knoblock, Kr...
AIM
2002
14 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
BMCBI
2004
135views more  BMCBI 2004»
14 years 9 months ago
Determination of the differentially expressed genes in microarray experiments using local FDR
Background: Thousands of genes in a genomewide data set are tested against some null hypothesis, for detecting differentially expressed genes in microarray experiments. The expect...
Julie Aubert, Avner Bar-Hen, Jean-Jacques Daudin, ...
BMCBI
2004
131views more  BMCBI 2004»
14 years 9 months ago
Alternative mapping of probes to genes for Affymetrix chips
Background: Short oligonucleotide arrays have several probes measuring the expression level of each target transcript. Therefore the selection of probes is a key component for the...
Laurent Gautier, Morten Møller, Lennart Fri...
« Prev « First page 1202 / 1240 Last » Next »