Sciweavers

1569 search results - page 213 / 314
» Using Organic Computing to Control Bunching Effects
Sort
View
155
Voted
BMCBI
2008
116views more  BMCBI 2008»
15 years 3 months ago
Gene Ontology annotations: what they mean and where they come from
To address the challenges of information integration and retrieval, the computational genomics community increasingly has come to rely on the methodology of creating annotations o...
David P. Hill, Barry Smith, Monica S. McAndrews-Hi...
DIM
2005
ACM
15 years 5 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
128
Voted
WSC
1998
15 years 4 months ago
Interactive Implementation of Optimal Simulation Experiment Designs
An attractive feature of many simulation packages is their availability on desktop computers and their potential for allowing the user to run a simulation model under different co...
Russell C. H. Cheng, John D. Lamb
135
Voted
SIGMETRICS
2008
ACM
128views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluation
Local network coding is growing in prominence as a technique to facilitate greater capacity utilization in multi-hop wireless networks. A specific objective of such local network ...
Shravan K. Rayanchu, Sayandeep Sen, Jianming Wu, S...
121
Voted
CCS
2009
ACM
15 years 10 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits