Sciweavers

6978 search results - page 1302 / 1396
» On Proofs in System P
Sort
View
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 3 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
CCGRID
2011
IEEE
13 years 20 days ago
Towards Real-Time, Volunteer Distributed Computing
Many large-scale distributed computing applications demand real-time responses by soft deadlines. To enable such real-time task distribution and execution on the volunteer resourc...
Sangho Yi, Emmanuel Jeannot, Derrick Kondo, David ...
ICASSP
2011
IEEE
13 years 15 days ago
Online detection of vocal Listener Responses with maximum latency constraints
When human listeners utter Listener Responses (e.g. back-channels or acknowledgments) such as ‘yeah’ and ‘mmhmm’, interlocutors commonly continue to speak or resume their ...
Daniel Neiberg, Khiet P. Truong
NAR
2011
189views Computer Vision» more  NAR 2011»
12 years 12 months ago
EDULISS: a small-molecule database with data-mining and pharmacophore searching capabilities
We present the relational database EDULISS (EDinburgh University Ligand Selection System), which stores structural, physicochemical and pharmacophoric properties of small molecule...
Kun-Yi Hsin, Hugh P. Morgan, Steven R. Shave, Andr...
ATAL
2011
Springer
12 years 9 months ago
Specifying and applying commitment-based business patterns
Recent work in communications and business modeling emphasizes a commitment-based view of interaction. By abstracting away from implementation-level details, commitments can poten...
Amit K. Chopra, Munindar P. Singh
« Prev « First page 1302 / 1396 Last » Next »