Sciweavers

7195 search results - page 1314 / 1439
» On Computing Power
Sort
View
SASN
2004
ACM
15 years 9 months ago
Source-location privacy in energy-constrained sensor network routing
As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become increasingly important. Although many privacy-related iss...
Celal Ozturk, Yanyong Zhang, Wade Trappe
108
Voted
AISC
2004
Springer
15 years 9 months ago
Algorithm-Supported Mathematical Theory Exploration: A Personal View and Strategy
Abstract. We present a personal view and strategy for algorithm-supported mathematical theory exploration and draw some conclusions for the desirable functionality of future mathem...
Bruno Buchberger
137
Voted
ICCHP
2004
Springer
15 years 9 months ago
Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children
: Multimedia and Hypermedia technologies can be successfully used in education and rehabilitation for cognitively disabled persons. In particular, storytelling has always proved su...
Thimoty Barbieri, Antonio Bianchi, Licia Sbattella
129
Voted
IMR
2004
Springer
15 years 9 months ago
3D Hybrid Mesh Generation for Reservoir Flow Simulation
A great challenge for flow simulators of new generation is to gain more accuracy at well proximity within complex geological structures. For this purpose, a new approach based on...
N. Flandrin, Houman Borouchaki, Chakib Bennis
132
Voted
CSB
2003
IEEE
118views Bioinformatics» more  CSB 2003»
15 years 8 months ago
Automated Protein NMR Resonance Assignments
NMR resonance peak assignment is one of the key steps in solving an NMR protein structure. The assignment process links resonance peaks to individual residues of the target protei...
Xiang Wan, Dong Xu, Carolyn M. Slupsky, Guohui Lin
« Prev « First page 1314 / 1439 Last » Next »