Sciweavers

6894 search results - page 1325 / 1379
» On network interference management
Sort
View
BMCBI
2010
138views more  BMCBI 2010»
14 years 12 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
105
Voted
IJISEC
2007
119views more  IJISEC 2007»
14 years 11 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
IJNSEC
2007
204views more  IJNSEC 2007»
14 years 11 months ago
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS
Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless networ...
Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani ...
CACM
2005
126views more  CACM 2005»
14 years 11 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
JLBS
2007
130views more  JLBS 2007»
14 years 11 months ago
Mobile positioning for traffic state acquisition
: The topics presented in this paper regard the project “Data Optimisation for integrated Telematics” (Do-iT) granted by the German ministry of economics and technology. Within...
Katrin Ramm, Volker Schwieger
« Prev « First page 1325 / 1379 Last » Next »