Sciweavers

8118 search results - page 1521 / 1624
» The Newton Application Architecture
Sort
View
PERVASIVE
2008
Springer
15 years 1 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...
IJCINI
2007
139views more  IJCINI 2007»
15 years 1 months ago
AURELLIO: A Cognitive Computational Knowledge Representation Theory
: Cognitive informatics (CI) studies the natural intelligence and internal information processing mechanisms of the brain, as well as the processes involved in perception and cogni...
Mehdi Najjar, André Mayers
TC
2008
15 years 1 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
104
Voted
INFSOF
2007
126views more  INFSOF 2007»
15 years 1 months ago
Software maintenance seen as a knowledge management issue
Creating and maintaining software systems is a knowledge intensive task. One needs to have a good understanding of the application domain, the problem to solve and all its require...
Nicolas Anquetil, Káthia Marçal de O...
121
Voted
BMCBI
2005
105views more  BMCBI 2005»
15 years 1 months ago
SNPHunter: a bioinformatic software for single nucleotide polymorphism data acquisition and management
Background: Single nucleotide polymorphisms (SNPs) provide an important tool in pinpointing susceptibility genes for complex diseases and in unveiling human molecular evolution. S...
Lin Wang, Simin Liu, Tianhua Niu, Xin Xu
« Prev « First page 1521 / 1624 Last » Next »