Sciweavers

7839 search results - page 1214 / 1568
» What's there and what's not
Sort
View
119
Voted
PUC
2008
120views more  PUC 2008»
15 years 10 days ago
Technology scruples: why intimidation will not save the recording industry and how enchantment might
While the recording industry continues to lobby for increasingly draconian laws to protect their interests, users of digital technology continue to share files and copy protected ...
Mark Blythe, Peter C. Wright
ISBRA
2010
Springer
15 years 10 days ago
Analysis of Gene Interactions Using Restricted Boolean Networks and Time-Series Data
A popular model for gene regulatory networks is the Boolean network model. In this paper, we propose an algorithm to perform an analysis of gene regulatory interactions using the B...
Carlos H. A. Higa, Vitor H. P. Louzada, Ronaldo Fu...
ISEM
2010
105views more  ISEM 2010»
15 years 10 days ago
A roadmap to adopting emerging technology in e-business: an empirical study
This study explores the firm’s readiness for developing emerging technology in e−business. By proposing a framework that captures technological, financial, and human capabilit...
Hsin-Lu Chang
132
Voted
ISOLA
2010
Springer
15 years 10 days ago
Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns
Abstract. This article deals with performance verifications of architecture models of real-time embedded systems. We focus on models verified with the real-time scheduling theory...
Alain Plantec, Frank Singhoff, Pierre Dissaux, J&e...
ISVC
2010
Springer
15 years 10 days ago
Acquisition Scenario Analysis for Face Recognition at a Distance
An experimental analysis of three acquisition scenarios for face recognition at a distance is reported, namely: close, medium, and far distance between camera and query face, the t...
Pedro Tome-Gonzalez, Julian Fiérrez-Aguilar...
« Prev « First page 1214 / 1568 Last » Next »