Sciweavers

1936 search results - page 329 / 388
» Unbundling Active Functionality
Sort
View
JCC
2006
58views more  JCC 2006»
14 years 11 months ago
On the reversible O2 binding of the Fe-porphyrin complex
: Electronic mechanism of the reversible O2 binding by heme was studied by using Density Functional Theory calculations. The ground state of oxyheme was calculated to be open singl...
Hiroyuki Nakashima, Jun-Ya Hasegawa, Hiroshi Nakat...
JCM
2006
135views more  JCM 2006»
14 years 11 months ago
Bandwidth Allocation and Session Scheduling using SIP
Session Initiation Protocol (SIP) is a new signaling protocol designed to establish multimedia sessions in telecommunication networks. In this paper, we suggest the extension of SI...
Hassan Hassan 0002, Jean-Marie Garcia, Olivier Bru...
JODS
2006
206views Data Mining» more  JODS 2006»
14 years 11 months ago
Emergent Semantics in Knowledge Sifter: An Evolutionary Search Agent Based on Semantic Web Services
This paper addresses the various facets of emergent semantics in content retrieval systems such as Knowledge Sifter, an architecture and system based on the use of specialized agen...
Larry Kerschberg, Hanjo Jeong, Wooju Kim
JTAER
2006
70views more  JTAER 2006»
14 years 11 months ago
Australian Franchisor websites: Moving towards network behaviour
Australia is one of the leading nations using the internet in both business-to-consumer (B2C) and business-tobusiness (B2B) settings (ABS 2004). However, little academic attention...
Sally Rao, Lorelle Frazer
NETWORK
2006
177views more  NETWORK 2006»
14 years 11 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang