Sciweavers

6274 search results - page 942 / 1255
» Proofs, Programs, Processes
Sort
View
NAR
2007
117views more  NAR 2007»
15 years 2 months ago
FGF: A web tool for Fishing Gene Family in a whole genome database
Gene duplication is an important process in evolution. The availability of genome sequences of a number of organisms has made it possible to conduct comprehensive searches for dup...
Hongkun Zheng, Junjie Shi, Xiaodong Fang, Yuan Li,...
ECSA
2010
Springer
15 years 1 months ago
Industry taxonomy engineering: the case of the European software ecosystem
Presently, no methods exist that support the creation process of an industry taxonomy within a specific domain. Without such a method, taxonomies remain erroneous, making the deve...
Ivo Hunink, Rene van Erk, Slinger Jansen, Sjaak Br...
JSAC
2008
95views more  JSAC 2008»
15 years 1 months ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
JSS
2010
111views more  JSS 2010»
15 years 1 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...
RAID
2010
Springer
15 years 1 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...