Sciweavers

29918 search results - page 5983 / 5984
» A computational model of belief
Sort
View
TMC
2012
11 years 9 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
SIGUCCS
2003
ACM
14 years 17 days ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
DSD
2002
IEEE
96views Hardware» more  DSD 2002»
14 years 9 days ago
Networks on Silicon: Blessing or Nightmare?
Continuing VLSI technology scaling raises several deep submicron (DSM) problems like relatively slow interconnect, power dissipation and distribution, and signal integrity. Those ...
Paul Wielage, Kees G. W. Goossens
AAAI
2008
13 years 9 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
BMCBI
2007
127views more  BMCBI 2007»
13 years 7 months ago
Predicting the phenotypic effects of non-synonymous single nucleotide polymorphisms based on support vector machines
Background: Human genetic variations primarily result from single nucleotide polymorphisms (SNPs) that occur approximately every 1000 bases in the overall human population. The no...
Jian Tian, Ningfeng Wu, Xuexia Guo, Jun Guo, Juhua...
« Prev « First page 5983 / 5984 Last » Next »