Sciweavers

5200 search results - page 941 / 1040
» Symbolic models for control systems
Sort
View
TWC
2008
127views more  TWC 2008»
13 years 8 months ago
Energy-Delay Analysis of MAC Protocols in Wireless Networks
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...
CANDC
2004
ACM
13 years 8 months ago
Identification of related gene/protein names based on an HMM of name variations
Gene and protein names follow few, if any, true naming conventions and are subject to great variation in different occurrences of the same name. This gives rise to two important p...
Lana Yeganova, Lawrence H. Smith, W. John Wilbur
IJSYSC
2000
74views more  IJSYSC 2000»
13 years 8 months ago
Towards the evolutionary emergence of increasingly complex advantageous behaviours
The generation of complex entities with advantageous behaviours beyond our manual design capability requires long-term incremental evolution with continuing emergence. In this pap...
A. D. Channon, Robert I. Damper
IAJIT
2010
157views more  IAJIT 2010»
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
KES
2008
Springer
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail