Sciweavers

1636 search results - page 80 / 328
» From Usability Lab to
Sort
View
123
Voted
WABI
2007
Springer
109views Bioinformatics» more  WABI 2007»
15 years 9 months ago
A Novel Method for Signal Transduction Network Inference from Indirect Experimental Evidence
In this paper we introduce a new method of combined synthesis and inference of biological signal transduction networks. A main idea of our method lies in representing observed cau...
Réka Albert, Bhaskar DasGupta, Riccardo Don...
115
Voted
WOWMOM
2006
ACM
84views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Measurements from an 802.11b Mobile Ad Hoc Network
This paper analyzes the characteristics of a multi-hop 802.11b mobile ad hoc network. We present data gathered from a mobile network of 20 devices carried by test users over 5 day...
Vincent Lenders, Jorg Wagner, Martin May
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 9 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
123
Voted
ERCIMDL
1999
Springer
146views Education» more  ERCIMDL 1999»
15 years 7 months ago
Metadata for Photographs: From Digital Library to Multimedia Application
This paper describes the production of an educational multimedia CD-ROM about French rural houses and farms, and how to renovate them without losing their traditional features. Th...
Anne-Marie Vercoustre, François Paradis
107
Voted
APCHI
1998
IEEE
15 years 7 months ago
The Design of Banking Websites: Lessons from Iterative Design
Iterative design is usually considered in the context of prototyping, evaluating, and improving a single product. We had the interesting opportunity to work on three distinct prod...
Tom Brinck, Darren Gergle