Sciweavers

727 search results - page 82 / 146
» A Replicator Dynamics Analysis of Difference Evaluation Func...
Sort
View
TON
2012
11 years 10 months ago
A Transport Protocol to Exploit Multipath Diversity in Wireless Networks
Abstract—Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and prov...
Vicky Sharma, Koushik Kar, K. K. Ramakrishnan, Shi...
BMCBI
2010
153views more  BMCBI 2010»
13 years 7 months ago
GOAL: A software tool for assessing biological significance of genes groups
Background: Modern high throughput experimental techniques such as DNA microarrays often result in large lists of genes. Computational biology tools such as clustering are then us...
Alain B. Tchagang, Alexander Gawronski, Hugo B&eac...
WCRE
2010
IEEE
13 years 6 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
SIGDIAL
2010
13 years 5 months ago
The vocal intensity of turn-initial cue phrases in dialogue
The present study explores the vocal intensity of turn-initial cue phrases in a corpus of dialogues in Swedish. Cue phrases convey relatively little propositional content, but hav...
Anna Hjalmarsson
PDP
2008
IEEE
14 years 2 months ago
Behavioural Skeletons in GCM: Autonomic Management of Grid Components
Autonomic management can be used to improve the QoS provided by parallel/distributed applications. We discuss behavioural skeletons introduced in earlier work: rather than relying...
Marco Aldinucci, Sonia Campa, Marco Danelutto, Mar...