Sciweavers

2116 search results - page 364 / 424
» Resource Analysis by Sup-interpretation
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 4 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
JDCTA
2010
122views more  JDCTA 2010»
13 years 3 months ago
The Financial Structure and High-Tech Industries Development in China
The transformation of economic development approach demands to develop high-tech industries, while high-tech industries can't develop without financial support, in which diff...
Liuyong Yang, Shensheng Mo, Anqi Zhou
NAR
2010
128views more  NAR 2010»
13 years 3 months ago
AntigenDB: an immunoinformatics database of pathogen antigens
The continuing threat of infectious disease and future pandemics, coupled to the continuous increase of drug-resistant pathogens, makes the discovery of new and better vaccines im...
Hifzur Rahman Ansari, Darren R. Flower, G. P. S. R...
MMM
2011
Springer
244views Multimedia» more  MMM 2011»
13 years 24 days ago
Generating Representative Views of Landmarks via Scenic Theme Detection
Visual summarization of landmarks is an interesting and non-trivial task with the availability of gigantic community-contributed resources. In this work, we investigate ways to gen...
Yi-Liang Zhao, Yan-Tao Zheng, Xiangdong Zhou, Tat-...
INFOCOM
2011
IEEE
13 years 16 days ago
A robust optimization approach to backup network design with random failures
—This paper presents a scheme in which a dedicated backup network is designed to provide protection from random link failures. Upon a link failure in the primary network, traffi...
Matthew Johnston, Hyang-Won Lee, Eytan Modiano