Results 1 - 10
of
16
AGR 05
"... Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation ..."
Abstract
- Add to MetaCart
Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation
Scenario Generation and Reduction for Long-term and Short-term Power System Generation Planning under Uncertainties
"... ii ..."
Guaranteeing Communication Quality in Real World WSN Deployments
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract
- Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
ACTA UNIVERSITATIS UPSALIENSIS
"... Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after deploymen ..."
Abstract
- Add to MetaCart
Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after
4. TITLE AND SUBTITLE A Practical Theory of Micro-Solar Power Sensor Networks
, 2009
"... Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract
- Add to MetaCart
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
Perspective An Online Bioinformatics Curriculum
"... Abstract: Online learning initia-tives over the past decade have become increasingly comprehen-sive in their selection of courses and sophisticated in their presen-tation, culminating in the recent announcement of a number of consortium and startup activities that promise to make a university educat ..."
Abstract
- Add to MetaCart
Abstract: Online learning initia-tives over the past decade have become increasingly comprehen-sive in their selection of courses and sophisticated in their presen-tation, culminating in the recent announcement of a number of consortium and startup activities that promise to make a university education on the internet, free of charge, a real possibility. At this pivotal moment it is appropriate to explore the potential for obtaining comprehensive bioinformatics training with currently existing free video resources. This article pre-sents such a bioinformatics curric-ulum in the form of a virtual course catalog, together with editorial commentary, and an assessment of strengths, weaknesses, and likely future directions for open online learning in this field. Online Learning Comes of Age Online academic ‘‘courseware’ ’ at the university level has now been available to the public for a decade, the earliest concerted effort having originated in 2002 with the Massachusetts Institute of Technology (MIT) and their OpenCour-seWare initiative
und Computeralgebra (CDC) Algebraic methods in analyzing lightweight cryptographic symmetric primitives
"... Algebraic methods in analyzing ..."
doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine
, 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract
- Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real
Results 1 - 10
of
16