Sciweavers

2684 search results - page 520 / 537
» On the Connectivity of Ad Hoc Networks
Sort
View
PADS
2003
ACM
14 years 1 months ago
HLA-based Adaptive Distributed Simulation of Wireless Mobile Systems
Wireless networks’ models differ from wired ones at least in the innovative dynamic effects of host-mobility and open-broadcast nature of the wireless medium. Topology changes d...
Luciano Bononi, Gabriele D'Angelo, Lorenzo Donatie...
SAC
2003
ACM
14 years 1 months ago
TinyGALS: A Programming Model for Event-Driven Embedded Systems
Networked embedded systems such as wireless sensor networks are usually designed to be event-driven so that they are reactive and power efficient. Programming embedded systems wit...
Elaine Cheong, Judith Liebman, Jie Liu, Feng Zhao
BMCBI
2005
124views more  BMCBI 2005»
13 years 7 months ago
Tools enabling the elucidation of molecular pathways active in human disease: Application to Hepatitis C virus infection
Background: The extraction of biological knowledge from genome-scale data sets requires its analysis in the context of additional biological information. The importance of integra...
David J. Reiss, Iliana Avila-Campillo, Vesteinn Th...
INTERACT
2003
13 years 9 months ago
SAP Community: Source for Business Interaction, Education, and Discussion
: Collaboration between e-business partners happens online and without boundaries. The SAP Community is a platform for business people around the globe to connect, interact and sha...
Raimund Mollenhauer, Richard Nikolic
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 2 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic