Sciweavers

15782 search results - page 2955 / 3157
» Network Optimization and Control
Sort
View
150
Voted
QNS
1996
15 years 5 months ago
Real Inferno
Inferno is an operating system well suited to applications that need to be portable, graphical, and networked. This paper describes the fundamental oating point facilities of the...
Eric Grosse
141
Voted
GD
2008
Springer
15 years 4 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
123
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
169
Voted
AC
2007
Springer
15 years 3 months ago
Free/Open Source Software Development: Recent Research Results and Methods
The focus of this chapter is to review what is known about free and open source software development (FOSSD) work practices, development processes, project and community dynamics,...
Walt Scacchi
142
Voted
BMCBI
2010
160views more  BMCBI 2010»
15 years 3 months ago
Quantitative model for inferring dynamic regulation of the tumour suppressor gene p53
Background: The availability of various "omics" datasets creates a prospect of performing the study of genomewide genetic regulatory networks. However, one of the major ...
Junbai Wang, Tianhai Tian
« Prev « First page 2955 / 3157 Last » Next »