Sciweavers

18697 search results - page 3735 / 3740
» Systemic Security Management
Sort
View
JACM
2010
120views more  JACM 2010»
14 years 6 months ago
The structure of inverses in schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Alan Nash
TITB
2010
163views Education» more  TITB 2010»
14 years 6 months ago
Absolute electrical impedance tomography (aEIT) guided ventilation therapy in critical care patients: simulations and future tre
Thoracic electrical impedance tomography (EIT) is a noninvasive, radiation-free monitoring technique whose aim is to reconstruct a cross-sectional image of the internal spatial dis...
Mouloud Azzedine Denaï, Mahdi Mahfouf, Suzani...
TMC
2010
86views more  TMC 2010»
14 years 6 months ago
Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations
Although the EDCA access mechanism of the 802.11e standard supports legacy DCF stations, the presence of DCF stations in the WLAN jeopardizes the provisioning of the service guaran...
Albert Banchs, Pablo Serrano, Luca Vollero
TMI
2010
208views more  TMI 2010»
14 years 6 months ago
Patient-Specific Modeling and Quantification of the Aortic and Mitral Valves From 4-D Cardiac CT and TEE
As decisions in cardiology increasingly rely on non-invasive methods, fast and precise image processing tools have become a crucial component of the analysis workflow. To the best ...
Razvan Ioan Ionasec, Ingmar Voigt, Bogdan Georgesc...
NAR
2011
374views Computer Vision» more  NAR 2011»
14 years 6 months ago
The BioGRID Interaction Database: 2011 update
The Biological General Repository for Interaction Datasets (BioGRID) is a public database that archives and disseminates genetic and protein interaction data from model organisms ...
Chris Stark, Bobby-Joe Breitkreutz, Andrew Chatr-a...
« Prev « First page 3735 / 3740 Last » Next »