Sciweavers

1541 search results - page 264 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
MOBICOM
2004
ACM
15 years 6 months ago
Exploiting medium access diversity in rate adaptive wireless LANs
Recent years have seen the growing popularity of multi-rate wireless network devices (e.g., 802.11a cards) that can exploit variations in channel conditions and improve overall ne...
Zhengrong Ji, Yi Yang, Junlan Zhou, Mineo Takai, R...
85
Voted
BIB
2006
69views more  BIB 2006»
15 years 17 days ago
Flux balance analysis in the era of metabolomics
Flux balance analysis (FBA) has emerged as an effective means to analyse biological networks in a quantitative manner. Much progress has been made on the extension of FBA to incor...
Jong Min Lee, Erwin P. Gianchandani, Jason A. Papi...
115
Voted
BMCBI
2005
152views more  BMCBI 2005»
15 years 12 days ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
WCE
2007
15 years 1 months ago
Constrained Path Optimisation for Underground Mine Layout
Abstract—The major infrastructure component required to develop an underground mine is a decline, which is a system of tunnels used for access and haulage. In this paper we study...
Marcus Brazil, P. A. Grossman, D. H. Lee, J. H. Ru...
JDFP
2006
139views more  JDFP 2006»
15 years 14 days ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer