Sciweavers

3555 search results - page 667 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ITC
1995
IEEE
102views Hardware» more  ITC 1995»
15 years 4 months ago
Visualizing Quality
Real-world data is known to be imperfect, suffering from various forms of defects such as sensor variability, estimation errors, uncertainty, human errors in data entry, and gaps ...
Solomon Max
PERVASIVE
2010
Springer
15 years 3 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
SPRINGSIM
2007
15 years 2 months ago
An architecture for wireless simulation in NS-2 applied to impulse-radio ultra-wide band networks
We present an architecture for implementing a wireless physical layer in a packet-based network simulator. We integrate this architecture in the popular ns-2 network simulator and...
Ruben Merz, Jean-Yves Le Boudec, Jörg Widmer
CORR
2010
Springer
66views Education» more  CORR 2010»
15 years 1 months ago
Polyominoes Simulating Arbitrary-Neighborhood Zippers and Tilings
This paper provides a bridge between the classical tiling theory and cellular automata on one side, and the complex neighborhood self-assembling situations that exist in practice,...
Lila Kari, Benoît Masson
BIB
2006
172views more  BIB 2006»
15 years 1 months ago
Advances in the Exon-Intron Database (EID)
Investigation of exon^intron gene structures is a non-trivial task due to enormous expansions of the eukaryotic genomes, great variety of gene forms, and the imperfectness in sequ...
Valery Shepelev, Alexei Fedorov