Sciweavers

2347 search results - page 295 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
FUIN
2007
147views more  FUIN 2007»
13 years 8 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
PUC
2006
89views more  PUC 2006»
13 years 8 months ago
Using ubiquitous computing in interactive mobile marketing
Unique features of handheld devices, including their mobility, personalization and location-awareness engender new types of applications for mobile commerce, such as mobile adverti...
Stan Kurkovsky, Karthik Harihar
IJBRA
2007
80views more  IJBRA 2007»
13 years 8 months ago
On predicting secondary structure transition
A function of a protein is dependent on its structure; therefore, predicting a protein structure from an amino acid sequence is an active area of research. Optimally predicting a ...
Raja Loganantharaj, Vivek Philip
IJON
2007
132views more  IJON 2007»
13 years 8 months ago
Emergence of population synchrony in a layered network of the cat visual cortex
Recently, a quantitative wiring diagram for the local neuronal network of cat visual cortex was described [T. Binzegger, R.J. Douglas, K.A.C. Martin, A quantitative map of the cir...
Jens Kremkow, Arvind Kumar, Stefan Rotter, Ad Aert...
SWARM
2008
SPRINGER
115views Optimization» more  SWARM 2008»
13 years 8 months ago
Path formation in a robot swarm
We present two swarm intelligence control mechanisms used for distributed robot path formation. In the first, the robots form linear chains. We study three variants of robot chains...
Shervin Nouyan, Alexandre Campo, Marco Dorigo