Sciweavers

2763 search results - page 144 / 553
» The Dangerous 'All' in Specifications
Sort
View
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 4 months ago
Hardware-Assisted Scanning for Signature Patterns in Image File Fragments
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is an important activity in the field of digital f...
Yoginder S. Dandass
ICDM
2007
IEEE
133views Data Mining» more  ICDM 2007»
14 years 4 months ago
Can the Content of Public News Be Used to Forecast Abnormal Stock Market Behaviour?
A popular theory of markets is that they are efficient: all available information is deemed to provide an accurate valuation of an asset at any time. In this paper, we consider ho...
Calum Robertson, Shlomo Geva, Rodney C. Wolff
WIMOB
2007
IEEE
14 years 4 months ago
The Analysis of the Optimal Periodic Ranging Slot Number in IEEE 802.16 OFDMA Systems
As part of the IEEE 802.16 protocol, the random access scheme is used for ranging. The ratio between the numbers of periodic ranging slots and data slots in the uplink subframe de...
Jihua Zhou, Xin Jin, Jiangtao Dong, Jinglin Shi, Z...
BIOWIRE
2007
Springer
14 years 3 months ago
Evolutionary and Temporal Dynamics of Transcriptional Regulatory Networks
Transcriptional regulation is a key mechanism that allows cells to make the appropriate amount of proteins at the right time. This is mediated by transcription factors that respond...
M. Madan Babu
ICWE
2007
Springer
14 years 3 months ago
WebRatio 5: An Eclipse-Based CASE Tool for Engineering Web Applications
: The goal of this work is to present the software WebRatio 5, which is a good representative of a new generation of CASE tools for model-driven design of Web applications. WebRati...
Roberto Acerbis, Aldo Bongio, Marco Brambilla, Ste...