Sciweavers

2338 search results - page 426 / 468
» Using UML to model relational database operations
Sort
View

Lecture Notes
742views
15 years 6 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 2 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
NSPW
2006
ACM
14 years 2 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
BMCBI
2008
128views more  BMCBI 2008»
13 years 8 months ago
Pairwise covariance adds little to secondary structure prediction but improves the prediction of non-canonical local structure
Background: Amino acid sequence probability distributions, or profiles, have been used successfully to predict secondary structure and local structure in proteins. Profile models ...
Christopher Bystroff, Bobbie-Jo M. Webb-Robertson

Publication
279views
15 years 6 months ago
Potential Networking Applications of Global Positioning Systems (GPS)
Global Positioning System (GPS) Technology allows precise determination of location, velocity, direction, and time. The price of GPS receivers is falling rapidly and the applicatio...
G. Dommety and Raj Jain