Sciweavers

4000 search results - page 177 / 800
» Simulation down under
Sort
View
132
Voted
WMASH
2004
ACM
15 years 9 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
141
Voted
DFG
2004
Springer
15 years 9 months ago
An Engineer's Workstation to Support Integrated Development of Flexible Production Control Systems
Abstract. Today's manufacturing industry demands flexible and decentralized production control systems to avoid hours of down time of the production line in case of a failure ...
Wilhelm Schäfer, Robert Wagner, Jürgen G...
132
Voted
IPSN
2004
Springer
15 years 9 months ago
Flexible power scheduling for sensor networks
We propose a distributed on-demand power-management protocol for collecting data in sensor networks. The protocol aims to reduce power consumption while supporting fluctuating dem...
Barbara Hohlt, Lance Doherty, Eric A. Brewer
RECOMB
2004
Springer
15 years 9 months ago
Application of Kernel Method to Reveal Subtypes of TF Binding Motifs
Transcription factor binding sites often contain several subtypes of sequences that follow not just one but several different patterns. We developed a novel sensitive method based ...
Alexander E. Kel, Yuri Tikunov, Nico Voss, Jü...
WABI
2004
Springer
100views Bioinformatics» more  WABI 2004»
15 years 9 months ago
Reversing Gene Erosion - Reconstructing Ancestral Bacterial Genomes from Gene-Content and Order Data
In the last few years, it has become routine to use gene-order data to reconstruct phylogenies, both in terms of edge distances (parsimonious sequences of operations that transform...
Joel V. Earnest-DeYoung, Emmanuelle Lerat, Bernard...