Sciweavers

2446 search results - page 226 / 490
» Principles of dataspace systems
Sort
View
BMCBI
2008
100views more  BMCBI 2008»
15 years 5 months ago
Hotspot Hunter: a computational system for large-scale screening and selection of candidate immunological hotspots in pathogen p
Background: T-cell epitopes that promiscuously bind to multiple alleles of a human leukocyte antigen (HLA) supertype are prime targets for development of vaccines and immunotherap...
Guanglan Zhang, Asif M. Khan, Kellathur N. Sriniva...
DC
2008
15 years 5 months ago
On implementing omega in systems with weak reliability and synchrony assumptions
We study the feasibility and cost of implementing --a fundamental failure detector at the core of many algorithms--in systems with weak reliability and synchrony assumptions. Intui...
Marcos Kawazoe Aguilera, Carole Delporte-Gallet, H...
JAIR
2008
157views more  JAIR 2008»
15 years 5 months ago
Qualitative System Identification from Imperfect Data
Experience in the physical sciences suggests that the only realistic means of understanding complex systems is through the use of mathematical models. Typically, this has come to ...
George Macleod Coghill, Ashwin Srinivasan, Ross D....
GLOBECOM
2009
IEEE
16 years 1 days ago
Lightweight Jammer Localization in Wireless Networks: System Design and Implementation
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
Konstantinos Pelechrinis, Iordanis Koutsopoulos, I...
161
Voted
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 11 months ago
Modular Integration Through Aspects: Making Cents of Legacy Systems
Recently, Continua Health Alliance has brought together a powerhouse team, including Cisco, IBM, Motorola and others, for personal telehealth products and services. This team will...
Celina Gibbs, Daniel Lohmann, Chunjian Robin Liu, ...