Sciweavers

862 search results - page 170 / 173
» BISON: Providing Business Information Analysis as a Service
Sort
View
COOPIS
2002
IEEE
14 years 17 days ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...
HAPTICS
2005
IEEE
14 years 1 months ago
Wearable Kinesthetic System for Capturing and Classifying Upper Limb Gesture
Background: Monitoring body kinematics has fundamental relevance in several biological and technical disciplines. In particular the possibility to exactly know the posture may fur...
R. Bartalesi, Federico Lorussi, M. Tesconi, Alessa...
NAR
2007
62views more  NAR 2007»
13 years 7 months ago
MolProbity: all-atom contacts and structure validation for proteins and nucleic acids
MolProbity is a general-purpose web server offering quality validation for 3D structures of proteins, nucleic acids and complexes. It provides detailed all-atom contact analysis o...
Ian W. Davis, Andrew Leaver-Fay, Vincent B. Chen, ...
GIS
2004
ACM
14 years 8 months ago
Energy efficient exact kNN search in wireless broadcast environments
The advances in wireless communication and decreasing costs of mobile devices have enabled users to access desired information at any time. Coupled with positioning technologies l...
Bugra Gedik, Aameek Singh, Ling Liu
ASWEC
2006
IEEE
14 years 1 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...