Sciweavers

12334 search results - page 201 / 2467
» The Use of C
Sort
View
I3E
2009
149views Business» more  I3E 2009»
15 years 2 months ago
Facilitating Business to Government Interaction Using a Citizen-Centric Web 2.0 Model
Modelling Business to Government (B2G) interaction is considered to be more complex than Citizen to Government (C2G) interaction, since the concept of authorized citizens, represen...
Alexandros Dais, Mara Nikolaidou, Dimosthenis Anag...
148
Voted
MCM
2010
14 years 11 months ago
Electromagnetic interrogation and the Doppler shift using the method of mappings
We consider the electromagnetic detection of hidden moving or oscillating conductive targets. The resulting mathematical problem involves computation of a Doppler shift for an ele...
H. T. Banks, Shuhua Hu, W. Clayton Thompson
ISBI
2011
IEEE
14 years 8 months ago
Automated lineage tree reconstruction from Caenorhabditis elegans image data using particle filtering based cell tracking
Caenorhabditis elegans is an important model organism for the study of molecular mechanisms of development and disease processes, due to its well-known genome and invariant cell l...
Noemí Carranza-Herrezuelo, Ihor Smal, Oleh ...
SIGCOMM
2012
ACM
13 years 7 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
C++
1994
132views more  C++ 1994»
15 years 6 months ago
ASX: An Object-Oriented Framework for Developing Distributed Applications
The ADAPTIVE Service eXecutive (ASX) is a highly modular and extensible object-oriented framework that simplifies the development and configuration of distributed applications on ...
Douglas C. Schmidt