Sciweavers

33356 search results - page 6671 / 6672
» Models of Continual Computation
Sort
View
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
SIGUCCS
2003
ACM
14 years 1 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
AAAI
2008
13 years 11 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
BMCBI
2007
127views more  BMCBI 2007»
13 years 8 months ago
Predicting the phenotypic effects of non-synonymous single nucleotide polymorphisms based on support vector machines
Background: Human genetic variations primarily result from single nucleotide polymorphisms (SNPs) that occur approximately every 1000 bases in the overall human population. The no...
Jian Tian, Ningfeng Wu, Xuexia Guo, Jun Guo, Juhua...
NAR
2000
182views more  NAR 2000»
13 years 8 months ago
tmRDB (tmRNA database)
Maintained at the University of Texas Health Science Center at Tyler, Texas, the tmRNA database (tmRDB) is accessible at the URL http://psyche.uthct.edu/dbs/ tmRDB/tmRDB.html with...
Christian Zwieb, Jacek Wower
« Prev « First page 6671 / 6672 Last » Next »