Sciweavers

209 search results - page 32 / 42
» Exploiting Information Relationships for Access Control
Sort
View
BMCBI
2005
125views more  BMCBI 2005»
13 years 10 months ago
Query3d: a new method for high-throughput analysis of functional residues in protein structures
Background: The identification of local similarities between two protein structures can provide clues of a common function. Many different methods exist for searching for similar ...
Gabriele Ausiello, Allegra Via, Manuela Helmer-Cit...
CHI
2003
ACM
14 years 11 months ago
Where on-line meets on the streets: experiences with mobile mixed reality games
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
IRES
2002
63views more  IRES 2002»
13 years 10 months ago
The Semantic Web, universalist ambition and some lessons from librarianship
Building the semantic web encounters problems similar to building large bibliographic systems. The experience of librarianship in controlling large, heterogeneous collections of b...
Terrence A. Brooks
ICASSP
2009
IEEE
14 years 5 months ago
Time-varying Opportunistic Protocol for maximizing sensor networks lifetime
We consider transmission scheduling by medium access control (MAC) protocols for energy limited wireless sensor networks (WSN) in order to maximize the network lifetime. Time-vary...
Kobi Cohen, Amir Leshem
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 5 months ago
Cross-Layer Optimization With Model-Based Parameter Exchange
— Cross-layer optimization (CLO) promises significant gains in comparison to a conventional system design, which does not allow for information exchange across layers. One of th...
Andreas Saul, Shoaib Khan, Gunther Auer, Wolfgang ...