Sciweavers

16513 search results - page 3268 / 3303
» Numerical Analysis Methods
Sort
View
JNW
2008
177views more  JNW 2008»
13 years 8 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
JASIS
2006
140views more  JASIS 2006»
13 years 8 months ago
Relevance criteria identified by health information users during Web searches
This study focused on the relevance judgments made by health information users using the Web. Health information users were conceptualized as motivated information users concerned...
Abe Crystal, Jane Greenberg
JCP
2006
157views more  JCP 2006»
13 years 8 months ago
CF-GeNe: Fuzzy Framework for Robust Gene Regulatory Network Inference
Most Gene Regulatory Network (GRN) studies ignore the impact of the noisy nature of gene expression data despite its significant influence upon inferred results. This paper present...
Muhammad Shoaib B. Sehgal, Iqbal Gondal, Laurence ...
JUCS
2008
113views more  JUCS 2008»
13 years 8 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JSAC
2006
130views more  JSAC 2006»
13 years 8 months ago
Performance Preserving Topological Downscaling of Internet-Like Networks
Abstract--The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
« Prev « First page 3268 / 3303 Last » Next »