Sciweavers

4184 search results - page 742 / 837
» Names of Our Lives
Sort
View
TMC
2008
127views more  TMC 2008»
15 years 1 months ago
Time and Energy Complexity of Distributed Computation of a Class of Functions in Wireless Sensor Networks
We consider a scenario in which a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing a...
Nilesh Khude, Anurag Kumar, Aditya Karnik
157
Voted
BMCBI
2005
122views more  BMCBI 2005»
15 years 1 months ago
Finding genomic ontology terms in text using evidence content
Background: The development of text mining systems that annotate biological entities with their properties using scientific literature is an important recent research topic. These...
Francisco M. Couto, Mário J. Silva, Pedro C...
JCNS
2007
89views more  JCNS 2007»
15 years 1 months ago
Synchronous and asynchronous bursting states: role of intrinsic neural dynamics
Brain signals such as local field potentials often display gamma-band oscillations (30–70 Hz) in a variety of cognitive tasks. These oscillatory activities possibly reflect sy...
Takashi Takekawa, Toshio Aoyagi, Tomoki Fukai
TON
2008
109views more  TON 2008»
15 years 1 months ago
On hierarchical traffic grooming in WDM networks
Abstract--The traffic grooming problem is of high practical importance in emerging wide-area wavelength division multiplexing (WDM) optical networks, yet it is intractable for any ...
Bensong Chen, George N. Rouskas, Rudra Dutta
126
Voted
TSE
2008
236views more  TSE 2008»
15 years 1 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...