Sciweavers

4880 search results - page 792 / 976
» Mechanism Design by Creditability
Sort
View
GRID
2006
Springer
15 years 4 months ago
Grid Deployment of Legacy Bioinformatics Applications with Transparent Data Access
Although grid computing offers great potential for executing large-scale bioinformatics applications, practical deployment is constrained by legacy interfaces. Most widely deployed...
Christophe Blanchet, Rémi Mollon, Douglas T...
GRID
2006
Springer
15 years 4 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
CE
2007
111views more  CE 2007»
15 years 4 months ago
Developing strategic and reasoning abilities with computer games at primary school level
The paper reports a small-scale, long-term pilot project designed to foster strategic and reasoning abilities in young primary school pupils by engaging them in a number of comput...
Rosa Maria Bottino, Lucia Ferlino, Michela Ott, Ma...
131
Voted
IJSNET
2008
113views more  IJSNET 2008»
15 years 4 months ago
Reservation-based protocol for monitoring applications using IEEE 802.15.4 sensor networks
: The IEEE 802.15.4 and Zigbee are protocols aimed at low-duty and low-power wireless sensor networks. Continuously monitoring applications such as applications of structural healt...
Vidya Krishnamurthy, Edward Sazonov
IJVR
2008
140views more  IJVR 2008»
15 years 4 months ago
Modelling Autonomous Virtual Agent Behaviours in a Virtual Environment for Risk
Our research deals with the design of a training system to support decision-making in the preparation and the management of maintenance interventions in high-risk industries namely...
Lydie Edward, Domitile Lourdeaux, Jean-Paul A. Bar...