Sciweavers

257 search results - page 42 / 52
» A Proposed Method for Release Planning from Use Case-based R...
Sort
View
BROADNETS
2004
IEEE
13 years 11 months ago
Handheld Routers: Intelligent Bandwidth Aggregation for Mobile Collaborative Communities
Multi-homed, mobile wireless computing and communication devices can spontaneously form communities to logically combine and share the bandwidth of each other's wide-area com...
Puneet Sharma, Sung-Ju Lee, Jack Brassil, Kang G. ...
CICLING
2006
Springer
13 years 11 months ago
Extracting Key Phrases to Disambiguate Personal Names on the Web
Abstract. When you search for information regarding a particular person on the web, a search engine returns many pages. Some of these pages may be for people with the same name. Ho...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
TASLP
2010
150views more  TASLP 2010»
13 years 2 months ago
Diffuse Reverberation Model for Efficient Image-Source Simulation of Room Impulse Responses
Abstract-- In many research fields of engineering and acoustics, the image-source model represents one of the most popular tools for the simulation of sound fields in virtual rever...
Eric A. Lehmann, Anders M. Johansson
BMCBI
2010
121views more  BMCBI 2010»
13 years 2 months ago
G-stack modulated probe intensities on expression arrays - sequence corrections and signal calibration
Background: The brightness of the probe spots on expression microarrays intends to measure the abundance of specific mRNA targets. Probes with runs of at least three guanines (G) ...
Mario Fasold, Peter F. Stadler, Hans Binder
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani