Sciweavers

6039 search results - page 1201 / 1208
» The Function Space of an Activity
Sort
View
ANCS
2009
ACM
13 years 5 months ago
Divide and discriminate: algorithm for deterministic and fast hash lookups
Exact and approximate membership lookups are among the most widely used primitives in a number of network applications. Hash tables are commonly used to implement these primitive ...
Domenico Ficara, Stefano Giordano, Sailesh Kumar, ...
EUSFLAT
2009
169views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Decentralized Adaptive Fuzzy-Neural Control of an Anaerobic Digestion Bioprocess Plant
The paper proposed to use recurrent Fuzzy-Neural Multi-Model (FNMM) identifier for decentralized identification of a distributed parameter anaerobic wastewater treatment digestion ...
Ieroham S. Baruch, Rosalba Galvan-Guerra
ICC
2009
IEEE
171views Communications» more  ICC 2009»
13 years 5 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
BCB
2010
150views Bioinformatics» more  BCB 2010»
13 years 2 months ago
Enzymatic target identification with dynamic states
As a metabolic network reaches from a state to a steady state, a subset of its fluxes gradually change. The sequence of intermediate states, called the dynamic state, shows the pa...
Bin Song, Sanjay Ranka, Tamer Kahveci
BMCBI
2010
104views more  BMCBI 2010»
13 years 2 months ago
A systematic study of genome context methods: calibration, normalization and combination
Background: Genome context methods have been introduced in the last decade as automatic methods to predict functional relatedness between genes in a target genome using the patter...
Luciana Ferrer, Joseph M. Dale, Peter D. Karp
« Prev « First page 1201 / 1208 Last » Next »