Sciweavers

889 search results - page 167 / 178
» User Roles in Document Analysis
Sort
View
MSWIM
2009
ACM
14 years 1 months ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
MODELLIERUNG
2001
13 years 10 months ago
Dependency Charts as a Means to Model Inter-Scenario Dependencies
: Scenarios/use cases have gained wide-spread use over the last couple of years. In software engineering they are mainly used to capture requirements and specify a system. Many sof...
Johannes Ryser, Martin Glinz
BMCBI
2008
106views more  BMCBI 2008»
13 years 8 months ago
SpliceCenter: A suite of web-based bioinformatic applications for evaluating the impact of alternative splicing on RT-PCR, RNAi,
Background: Over 60% of protein-coding genes in vertebrates express mRNAs that undergo alternative splicing. The resulting collection of transcript isoforms poses significant chal...
Michael C. Ryan, Barry Zeeberg, Natasha J. Caplen,...
RAS
2007
148views more  RAS 2007»
13 years 8 months ago
Including probabilistic target detection attributes into map representations
Range measuring sensors can play an extremely important role in robot navigation. All range measuring devices rely on a ‘detection criterion’ made in the presence of noise, to...
John Mullane, Ebi Jose, Martin David Adams, Wijeru...