Sciweavers

13043 search results - page 2279 / 2609
» Simulation of the research process
Sort
View
129
Voted
ICIS
2003
15 years 6 months ago
A Computational Approach to Compare Information Revelation Policies
Revelation policies in an e-marketplace differ in terms of the level of competitive information disseminated to participating sellers. Since sellers who repeatedly compete against...
Amy R. Greenwald, Karthik Kannan, Ramayya Krishnan
124
Voted
VIIP
2001
15 years 6 months ago
Parallel Detection of Closed Streamlines in Planar Flows
Closed streamlines are an integral part of vector field topology, since they behave like sources respectively sinks but are often neither considered nor detected. If a streamline ...
Thomas Wischgoll, Gerik Scheuermann, Hans Hagen
118
Voted
WORM
2004
15 years 6 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
WSCG
2004
158views more  WSCG 2004»
15 years 6 months ago
Fully Automatic Elastic Registration of MR Images with Statistical Feature Extraction
We present a fully automatic scheme for the registration of MR images. The registration is carried out as a combination of an affine and an elastic transformation. The affine part...
Martin Held, Werner Weiser, Franz Wilhelmstöt...
PSB
2003
15 years 6 months ago
Towards Identifying Lateral Gene Transfer Events
This paper is concerned with evaluating the performance of the model and algorithm in [7] for detecting lateral gene transfers events. Using a Poisson process to describe arrival t...
Louigi Addario-Berry, Michael T. Hallett, Jens Lag...
« Prev « First page 2279 / 2609 Last » Next »