Sciweavers

7311 search results - page 1443 / 1463
» Time in State Machines
Sort
View
ENVSOFT
2006
72views more  ENVSOFT 2006»
13 years 7 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
BMCBI
2007
217views more  BMCBI 2007»
13 years 7 months ago
On consensus biomarker selection
Background: Recent development of mass spectrometry technology enabled the analysis of complex peptide mixtures. A lot of effort is currently devoted to the identification of biom...
Janusz Dutkowski, Anna Gambin
IJMMS
2008
72views more  IJMMS 2008»
13 years 7 months ago
Zoom interaction design for pen-operated portable devices
Maps are currently the most common application domain for ZUIs. Standard techniques for controlling such interfaces on pen-operated devices usually rely on sequential interaction,...
Thorsten Büring, Jens Gerken, Harald Reiterer
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 7 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CN
2007
168views more  CN 2007»
13 years 7 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
« Prev « First page 1443 / 1463 Last » Next »