Sciweavers

12637 search results - page 2504 / 2528
» Security for Extensible Systems
Sort
View
BMCBI
2008
87views more  BMCBI 2008»
13 years 7 months ago
Volume-based solvation models out-perform area-based models in combined studies of wild-type and mutated protein-protein interfa
Background: Empirical binding models have previously been investigated for the energetics of protein complexation (G models) and for the influence of mutations on complexation (i....
Salim Bougouffa, Jim Warwicker
BMCBI
2008
106views more  BMCBI 2008»
13 years 7 months ago
Ontology Design Patterns for bio-ontologies: a case study on the Cell Cycle Ontology
Background: Bio-ontologies are key elements of knowledge management in bioinformatics. Rich and rigorous bio-ontologies should represent biological knowledge with high fidelity an...
Mikel Egaña Aranguren, Erick Antezana, Mart...
CN
2008
100views more  CN 2008»
13 years 7 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
CN
2008
127views more  CN 2008»
13 years 7 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
COMCOM
2008
151views more  COMCOM 2008»
13 years 7 months ago
Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links
With the unique features of spatial multiplexing and interference suppression, Multiple Input Multiple Output (MIMO) techniques have great potential in the improvement of network ...
Jun Wang, Peng Du, Weijia Jia, Liusheng Huang, Hua...
« Prev « First page 2504 / 2528 Last » Next »