Sciweavers

1500 search results - page 239 / 300
» The Importance of Data Collection for Modelling Contact Netw...
Sort
View
WETICE
1997
IEEE
13 years 12 months ago
Boundaries, Awareness and Interaction in Collaborative Virtual Environments
This paper is concerned with how collaborative virtual environments can be structured in order to enable greater scalability and yet maintain a richness of communication. Based on...
Chris Greenhalgh, Steve Benford
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
13 years 11 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
ANOR
2010
139views more  ANOR 2010»
13 years 6 months ago
Some operations research methods for analyzing protein sequences and structures
Operations Research is probably one of the most successful fields of applied mathematics used in Economics, Physics, Chemistry, almost everywhere onehastoanalyzehugeamountsofdata.L...
Piotr Lukasiak, Jacek Blazewicz, Maciej Milostan
ICDM
2006
IEEE
127views Data Mining» more  ICDM 2006»
14 years 1 months ago
Predictive Integration of Gene Ontology-Driven Similarity and Functional Interactions
There is a need to develop methods to automatically incorporate prior knowledge to support the prediction and validation of novel functional associations. One such important sourc...
Francisco Azuaje, Haiying Wang, Huiru Zheng, Olivi...
INFOCOM
2011
IEEE
12 years 11 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz