Sciweavers

2047 search results - page 332 / 410
» Pervasive Computing on Active Networks
Sort
View
DAIS
2006
15 years 5 months ago
Mobile Process Description and Execution
Abstract. Mobile devices are increasingly aware of their respective locations and vicinity and tend to communicate rather loosely with each other; therefore asynchronous communicat...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
APCCM
2009
15 years 5 months ago
Conceptional Modeling and Analysis of Spatio-Temporal Processes in Biomolecular Systems
In life science, deeper understanding of biomolecular systems is acquired by computational modeling and analysis. For the modeling of several kinds of reaction networks, e.g. sign...
Andreas Schäfer, Mathias John
NAR
2011
176views Computer Vision» more  NAR 2011»
14 years 7 months ago
IUPHAR-DB: new receptors and tools for easy searching and visualization of pharmacological data
The IUPHAR database is an established online reference resource for several important classes of human drug targets and related proteins. As well as providing recommended nomencla...
Joanna L. Sharman, Chidochangu P. Mpamhanga, Micha...
PERCOM
2006
ACM
16 years 3 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 11 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto