Sciweavers

2500 search results - page 474 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 8 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
NN
2008
Springer
158views Neural Networks» more  NN 2008»
13 years 8 months ago
Improved mapping of information distribution across the cortical surface with the support vector machine
The early visual cortices represent information of several stimulus attributes, such as orientation and color. To understand the coding mechanisms of these attributes in the brain...
Youping Xiao, Ravi Rao, Guillermo A. Cecchi, Ehud ...
INFSOF
2007
139views more  INFSOF 2007»
13 years 8 months ago
Predicting software defects in varying development lifecycles using Bayesian nets
An important decision problem in many software projects is when to stop testing and release software for use. For many software products, time to market is critical and therefore ...
Norman E. Fenton, Martin Neil, William Marsh, Pete...
BMCBI
2005
122views more  BMCBI 2005»
13 years 8 months ago
A neural strategy for the inference of SH3 domain-peptide interaction specificity
Background: The SH3 domain family is one of the most representative and widely studied cases of so-called Peptide Recognition Modules (PRM). The polyproline II motif PxxP that gen...
Enrico Ferraro, Allegra Via, Gabriele Ausiello, Ma...
JLBS
2007
130views more  JLBS 2007»
13 years 8 months ago
Mobile positioning for traffic state acquisition
: The topics presented in this paper regard the project “Data Optimisation for integrated Telematics” (Do-iT) granted by the German ministry of economics and technology. Within...
Katrin Ramm, Volker Schwieger