Sciweavers

664 search results - page 132 / 133
» Solution to the Counterfeit Coin Problem and its Generalizat...
Sort
View
BMCBI
2006
120views more  BMCBI 2006»
13 years 7 months ago
Integrating protein structures and precomputed genealogies in the Magnum database: Examples with cellular retinoid binding prote
Background: When accurate models for the divergent evolution of protein sequences are integrated with complementary biological information, such as folded protein structures, anal...
Michael E. Bradley, Steven A. Benner
CN
2007
111views more  CN 2007»
13 years 7 months ago
An auction mechanism for allocating the bandwidth of networks to their users
We present a mechanism for auctioning bandwidth on a network-wide basis to end users or ISPs that will utilize it for the same time period. This mechanism consists of a set of sim...
Manos Dramitinos, George D. Stamoulis, Costas Cour...
JCP
2006
90views more  JCP 2006»
13 years 7 months ago
Using LDA Method to Provide Mobile Location Estimation Services within a Cellular Radio Network
Abstract-- Mobile location estimation is becoming an important value-added service for a mobile phone operator. It is well-known that GPS can provide an accurate location estimatio...
Junyang Zhou, Joseph Kee-Yin Ng
SAC
2008
ACM
13 years 6 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
KBSE
2010
IEEE
13 years 5 months ago
Test generation to expose changes in evolving programs
Software constantly undergoes changes throughout its life cycle, and thereby it evolves. As changes are introduced into a code base, we need to make sure that the effect of the ch...
Dawei Qi, Abhik Roychoudhury, Zhenkai Liang