Sciweavers

2347 search results - page 195 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
DAC
1999
ACM
14 years 21 days ago
Crosstalk Minimization Using Wire Perturbations
We study the variation of the crosstalk in a net and its neighbors when one of its trunks is perturbed, showing that the trunk’s perturbation range can be efficiently divided i...
Prashant Saxena, C. L. Liu
BMCBI
2006
87views more  BMCBI 2006»
13 years 8 months ago
Prediction of indirect interactions in proteins
Background: Both direct and indirect interactions determine molecular recognition of ligands by proteins. Indirect interactions can be defined as effects on recognition controlled...
Peteris Prusis, Staffan Uhlén, Ramona Petro...
TKDE
2011
183views more  TKDE 2011»
13 years 3 months ago
Mining Discriminative Patterns for Classifying Trajectories on Road Networks
—Classification has been used for modeling many kinds of data sets, including sets of items, text documents, graphs, and networks. However, there is a lack of study on a new kind...
Jae-Gil Lee, Jiawei Han, Xiaolei Li, Hong Cheng
DSN
2004
IEEE
14 years 3 days ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
IMAMS
2007
115views Mathematics» more  IMAMS 2007»
13 years 9 months ago
Segmenting Periodic Reliefs on Triangle Meshes
Decorative reliefs are widely used for e.g. packaging and porcelain design. In periodic reliefs, the relief repeats a pattern, for example all the way around an underlying surface...
Shenglan Liu, Ralph R. Martin, Frank C. Langbein, ...