Sciweavers

2135 search results - page 95 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
IJON
2007
96views more  IJON 2007»
13 years 8 months ago
Suppressive effects in visual search: A neurocomputational analysis of preview search
In the real world, visual information is selected over time as well as space, when we prioritise new stimuli for attention. Watson and Humphreys [Visual marking: prioritising sele...
Eirini Mavritsaki, Dietmar Heinke, Glyn W. Humphre...
RIDE
2002
IEEE
14 years 1 months ago
Extensible Data Management in the Middle-Tier
Current data management solutions are largely optimized for intra-enterprise, client-server applications. They depend on predictability, predefined structure, and universal admini...
Brian F. Cooper, Neal Sample, Michael J. Franklin,...
NOCS
2008
IEEE
14 years 2 months ago
Real-Time Communication Analysis for On-Chip Networks with Wormhole Switching
Abstract— In this paper, we discuss a real-time on-chip communication service with a priority-based wormhole switching policy. A novel off-line schedulability analysis approach i...
Zheng Shi, Alan Burns
BMCBI
2011
13 years 3 months ago
Context-dependent transcriptional regulations between signal transduction pathways
Background: Cells coordinate their metabolism, proliferation, and cellular communication according to environmental cues through signal transduction. Because signal transduction h...
Sohyun Hwang, Sangwoo Kim, Heesung Shin, Doheon Le...
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
14 years 2 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...