Sciweavers

7508 search results - page 1387 / 1502
» A new approach for distributed computing in avionics systems
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
13 years 8 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
EOR
2010
102views more  EOR 2010»
13 years 8 months ago
The Tree of Hubs Location Problem
The Tree-of-Hubs Location Problem is studied. This problem, which combines several aspects of some location, network design and routing problems, is inspired by those transportati...
Iván A. Contreras, Elena Fernández, ...
IJON
2006
117views more  IJON 2006»
13 years 7 months ago
EEG classification using generative independent component analysis
We present an application of Independent Component Analysis (ICA) to the discrimination of mental tasks for EEG-based Brain Computer Interface systems. ICA is most commonly used w...
Silvia Chiappa, David Barber
NAR
2007
150views more  NAR 2007»
13 years 7 months ago
CellCircuits: a database of protein network models
CellCircuits (http://www.cellcircuits.org) is an openaccess database of molecular network models, designed to bridge the gap between databases of individual pairwise molecular int...
H. Craig Mak, Mike Daly, Bianca Gruebel, Trey Idek...
PVLDB
2010
122views more  PVLDB 2010»
13 years 6 months ago
Database Replication: a Tale of Research across Communities
Replication is a key mechanism to achieve scalability and fault-tolerance in databases. Its importance has recently been further increased because of the role it plays in achievin...
Bettina Kemme, Gustavo Alonso
« Prev « First page 1387 / 1502 Last » Next »