Sciweavers

946 search results - page 173 / 190
» Maximizing data locality in distributed systems
Sort
View
JITECH
2010
116views more  JITECH 2010»
13 years 7 months ago
Design theory for dynamic complexity in information infrastructures: the case of building internet
We propose a design theory that tackles dynamic complexity in the design for Information Infrastructures (IIs) defined as a shared, open, heterogeneous and evolving socio-technica...
Ole Hanseth, Kalle Lyytinen
MOBIHOC
2006
ACM
14 years 8 months ago
Algorithmic aspects of communication in ad-hoc networks with smart antennas
Smart antennas have gained significant importance in multihop wireless networks in recent years, because of their sophisticated signal processing capabilities that hold the potent...
Karthikeyan Sundaresan, Weizhao Wang, Stephan Eide...
BMCBI
2005
130views more  BMCBI 2005»
13 years 8 months ago
Squid - a simple bioinformatics grid
Background: BLAST is a widely used genetic research tool for analysis of similarity between nucleotide and protein sequences. This paper presents a software application entitled &...
Paulo C. Carvalho, Rafael V. Glória, Antoni...
DATASCIENCE
2007
106views more  DATASCIENCE 2007»
13 years 8 months ago
Linking the Taiwan Fish Database to the Global Database
Under the support of the National Digital Archive Program (NDAP), basic species information about most Taiwanese fishes, including their morphology, ecology, distribution, specime...
Kwang-Tsao Shao, Jack Yung-Chang Lin, Hsin-Hua Lin
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin