Sciweavers

32032 search results - page 6354 / 6407
» Verified programming in Guru
Sort
View
TCBB
2010
104views more  TCBB 2010»
14 years 9 months ago
Fast Hinge Detection Algorithms for Flexible Protein Structures
— Analysis of conformational changes is one of the keys to the understanding of protein functions and interactions. For the analysis, we often compare two protein structures, tak...
Tetsuo Shibuya
TMC
2010
179views more  TMC 2010»
14 years 9 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
TMC
2010
130views more  TMC 2010»
14 years 9 months ago
SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes
—This paper presents SYNAPSE++, a system for over the air reprogramming of wireless sensor networks (WSNs). In contrast to previous solutions, which implement plain negative ackn...
Michele Rossi, Nicola Bui, Giovanni Zanca, Luca St...
TPDS
2010
93views more  TPDS 2010»
14 years 9 months ago
Self-Consistent MPI Performance Guidelines
Message passing using the Message Passing Interface (MPI) is at present the most widely adopted framework for programming parallel applications for distributed-memory and clustere...
Jesper Larsson Träff, William D. Gropp, Rajee...
TSE
2010
118views more  TSE 2010»
14 years 9 months ago
Exception Handling Patterns for Process Modeling
—Process modeling allows for analysis and improvement of processes that coordinate multiple people and tools working together to carry out a task. Process modeling typically focu...
Barbara Staudt Lerner, Stefan Christov, Leon J. Os...
« Prev « First page 6354 / 6407 Last » Next »