Sciweavers

5722 search results - page 1116 / 1145
» Security Function Interactions
Sort
View
ATAL
2008
Springer
13 years 12 months ago
Decentralised coordination of low-power embedded devices using the max-sum algorithm
This paper considers the problem of performing decentralised coordination of low-power embedded devices (as is required within many environmental sensing and surveillance applicat...
Alessandro Farinelli, Alex Rogers, Adrian Petcu, N...
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
13 years 12 months ago
Indoor Location Prediction Using Multiple Wireless Received Signal Strengths
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
Kha Tran, Dinh Q. Phung, Brett Adams, Svetha Venka...
BIRD
2008
Springer
109views Bioinformatics» more  BIRD 2008»
13 years 12 months ago
A Robust Class of Stable Proteins in the 2D HPC Model
The inverse protein folding problem is that of designing an amino acid sequence which has a prescribed native protein fold. This problem arises in drug design where a particular st...
Alireza Hadj Khodabakhshi, Ján Manuch, Aras...
COLCOM
2007
IEEE
13 years 11 months ago
Using context to assist the adaptation of protected multimedia content in virtual collaboration applications
—This paper proposes a framework for a virtual classroom application based on a Virtual Collaboration System (VCS), which is being developed under the VISNET II Network of Excell...
Maria Teresa Andrade, Hemantha Kodikara Arachchi, ...
DILS
2008
Springer
13 years 11 months ago
VisGenome and Ensembl: Usability of Integrated Genome Maps
It is not always clear how best to represent integrated data sets, and which application and database features allow a scientist to take best advantage of data coming from various ...
Joanna Jakubowska, Ela Hunt, John McClure, Matthew...
« Prev « First page 1116 / 1145 Last » Next »