Sciweavers

1626 search results - page 165 / 326
» The method evaluation model: a theoretical model for validat...
Sort
View
P2P
2007
IEEE
14 years 2 months ago
A Data Placement Scheme with Time-Related Model for P2P Storages
Maintaining desired data availability while minimizing costs is the primary challenge in designing P2P storages. Data placement schemes and data availability calculation methods a...
Jing Tian, Zhi Yang, Yafei Dai
BMCBI
2005
124views more  BMCBI 2005»
13 years 8 months ago
Evaluating concentration estimation errors in ELISA microarray experiments
Background: Enzyme-linked immunosorbent assay (ELISA) is a standard immunoassay to estimate a protein's concentration in a sample. Deploying ELISA in a microarray format perm...
Don Simone Daly, Amanda M. White, Susan M. Varnum,...
EWC
2007
60views more  EWC 2007»
13 years 8 months ago
A simulation-based design paradigm for complex cast components
This paper describes and exercises a new design paradigm for cast components. The methodology integrates foundry process simulation, non-destructive evaluation (nde), stress analys...
Stéphane P. A. Bordas, James G. Conley, Bri...
IJVR
2007
108views more  IJVR 2007»
13 years 8 months ago
Design and Narrative Structure for the Virtual Human Scenarios
—This article describes the design of the two application scenarios of the Virtual Human project and its integration into the Virtual Human system. This includes overall concepts...
Stefan Göbel, Ido Aharon Iurgel, Markus R&oum...
JNW
2008
118views more  JNW 2008»
13 years 6 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo