Sciweavers

3868 search results - page 694 / 774
» Open Systems in TLA
Sort
View
MOBICOM
2010
ACM
15 years 3 days ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
BMCBI
2010
127views more  BMCBI 2010»
15 years 14 hour ago
Computational prediction of type III secreted proteins from gram-negative bacteria
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...
122
Voted
BMCBI
2010
136views more  BMCBI 2010»
15 years 14 hour ago
A hub-attachment based method to detect functional modules from confidence-scored protein interactions and expression profiles
Background: Many research results show that the biological systems are composed of functional modules. Members in the same module usually have common functions. This is useful inf...
Chia-Hao Chin, Shu-Hwa Chen, Chin-Wen Ho, Ming-Tat...
CN
2010
120views more  CN 2010»
15 years 7 hour ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan
ESE
2006
105views Database» more  ESE 2006»
14 years 12 months ago
Replaying development history to assess the effectiveness of change propagation tools
As developers modify software entities such as functions or variables to introduce new features, enhance old ones, or fix bugs, they must ensure that other entities in the software...
Ahmed E. Hassan, Richard C. Holt