• Login
    Search 
    •   Home
    • Scholarly Contributions
    • Computing, School of
    • Search
    •   Home
    • Scholarly Contributions
    • Computing, School of
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 32

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Deformable Registration to Create Cytoarchitectonic Probability Maps for Functional Analysis of Primary Auditory Cortex 

    Bailey, Lara (2008-09-30)
    A novel method is presented for analyzing fMRI data, which relies on probabilistic estimates of microanatomically defined regions in individual fMRI volunteers. Postmortem structural and cytoarchitectonic information from ...
    Thumbnail

    A Computer Language Transformation System Capable of Generalized Context-Dependent Parsing 

    Thurston, Adrian (2008-12-16)
    Source transformation systems are special-purpose programming languages, or in some cases suites of languages, that are designed for the analysis and transformation of computer languages. They enable rapid prototyping of ...
    Thumbnail

    Computer-aided exercise 

    Yim, Jeffrey W. H. (2008-06-30)
    An underlying goal of designers of some exercise video games is to increase people's motivation to exercise. Research in the field of exercise psychology shows that performing physical activity in groups increases exercise ...
    Thumbnail

    An Empirical Study of a Language - based Security Testing Technique 

    Aboelfotoh, Muhammad (2008-09-27)
    Application layer protocols have become sophisticated to the level that they have become languages in their own right. Security testing of network applications is indisputably an essential task that must be carried out ...
    Thumbnail

    A SENSOR-BASED APPROACH TO MONITORING WEB SERVICE 

    Li, Jun (2008-11-12)
    As the use of Web expands, Web Service is gradually becoming the basic system infrastructure. However, as it matures and a large number of Web Service becomes available, the focus will shift from service development to ...
    Thumbnail

    The Universal Similarity Metric, Applied to Contact Maps Comparison in A Two-Dimensional Space 

    Rahmati, Sara (2008-09-27)
    Comparing protein structures based on their contact maps is an important problem in structural proteomics. Building a system for reconstructing protein tertiary structures from their contact maps is one of the motivations ...
    Thumbnail

    Frame Partitioning in WiMax Mesh Mode 

    Albluwi, Qutaiba (2008-10-02)
    WiMax or the IEEE 802.16 standard is one of the most promising broadband wireless technologies nowadays. It is characterized by its high data rates, large coverage area, flexible design and QoS support. The standard ...
    Thumbnail

    BUSINESS PROCESS RECOVERY USING UI DESIGN PATTERNS AND CLONE DETECTION IN BUSINESS PROCESSES 

    Guo, Jin (2008-10-28)
    A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by following business rules to achieve business ...
    Thumbnail

    Using Economic Models to Tune Resource Allocations in Database Management Systems 

    Zhang, Mingyi (2008-11-17)
    Resource allocation in a database management system (DBMS) is a performance management process in which an autonomic DBMS makes resource allocation decisions based on properties like workload business importance. We propose ...
    Thumbnail

    An Adaptable Context-Management Framework for Pervasive Computing 

    Zebedee, Jared A. (2008-09-15)
    Pervasive Computing presents an exciting realm where intelligent devices interact within the background of our environments to create a more intuitive experience for their human users. We demonstrate enabling context-awareness ...
    • 1
    • 2
    • 3
    • 4

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of QSpaceCommunities & CollectionsPublished DatesAuthorsTitlesSubjectsTypesThis CommunityPublished DatesAuthorsTitlesSubjectsTypes

    My Account

    LoginRegister

    Discover

    AuthorAbdulsalam, Hanady (1)Aboelfotoh, Muhammad (1)Albluwi, Qutaiba (1)Baig, Mariam (1)Bailey, Lara (1)Beiko, Jeffrey Lee (1)Brake, Nevon (1)Dayanand, Pooja (1)Dhrona, Pratik (1)Dragert, Christopher (1)... View MoreSubjectComputer Science (5)Program comprehension (2)Anomaly analysis (1)Approximation Algorithm (1)Auditory Cortex (1)Auditory grouping (1)Automated refactoring (1)automated summarization (1)Autonomic Computing (1)Autonomic computing (1)... View MoreDate Published2008 (32)

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV