Sciweavers

798 search results - page 71 / 160
» Comparing the expressive power of access control models
Sort
View
BMCBI
2004
90views more  BMCBI 2004»
13 years 8 months ago
Statistical monitoring of weak spots for improvement of normalization and ratio estimates in microarrays
Background: Several aspects of microarray data analysis are dependent on identification of genes expressed at or near the limits of detection. For example, regression-based normal...
Igor Dozmorov, Nicholas Knowlton, Yuhong Tang, Mic...
ICC
2007
IEEE
14 years 3 months ago
UWB Geo-Regioning Using Multivariate Channel Statistics
Abstract— Ultra-Wideband (UWB) Geo-Regioning is an approach to localize UWB transmitters by means of their channel impulse responses. A received channel impulse response is assig...
Christoph Steiner, Armin Wittneben
IJWMC
2006
100views more  IJWMC 2006»
13 years 9 months ago
A microscopic study of power management in IEEE 802.11 wireless networks
IEEE 802.11 power-save mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power manag...
Chunyu Hu, Rong Zheng, Jennifer C. Hou, Lui Sha
DATE
2006
IEEE
101views Hardware» more  DATE 2006»
14 years 3 months ago
A parallel configuration model for reducing the run-time reconfiguration overhead
Multitasking on reconfigurable logic can achieve very high silicon reusability. However, configuration latency is a major limitation and it can largely degrade the system performa...
Yang Qu, Juha-Pekka Soininen, Jari Nurmi
ERLANG
2006
ACM
14 years 3 months ago
Concurrency oriented programming in termite scheme
Termite Scheme is a variant of Scheme intended for distributed computing. It offers a simple and powerful concurrency model, inspired by the Erlang programming language, which is ...
Guillaume Germain