Sciweavers

7741 search results - page 1498 / 1549
» Security in Active Networks
Sort
View
NN
2006
Springer
122views Neural Networks» more  NN 2006»
15 years 3 months ago
Goals and means in action observation: A computational approach
Many of our daily activities are supported by behavioural goals that guide the selection of actions, which allow us to reach these goals effectively. Goals are considered to be im...
Raymond H. Cuijpers, Hein T. van Schie, Mathieu Ko...
IJMMS
2007
91views more  IJMMS 2007»
15 years 3 months ago
Mining communities and their relationships in blogs: A study of online hate groups
Blogs, often treated as the equivalence of online personal diaries, have become one of the fastest growing types of Web-based media. Everyone is free to express their opinions and...
Michael Chau, Jennifer Jie Xu
151
Voted
JBCB
2007
161views more  JBCB 2007»
15 years 3 months ago
On Cooperative Quasi-Equilibrium Models of transcriptional Regulation
Mechanistic models for transcriptional regulation are derived using the methods of equilibrium statistical mechanics, to model equilibrating processes that occur at a fast time sc...
Eric Mjolsness
TON
2008
138views more  TON 2008»
15 years 3 months ago
On the performance benefits of multihoming route control
Multihoming is increasingly being employed by large enterprises and data centers to extract good performance and reliability from their ISP connections. Multihomed end networks tod...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
138
Voted
GIS
2002
ACM
15 years 3 months ago
Remote access to large spatial databases
Enterprises in the public and private sectors have been making their large spatial data archives available over the Internet. However, interactive work with such large volumes of ...
Egemen Tanin, Frantisek Brabec, Hanan Samet
« Prev « First page 1498 / 1549 Last » Next »