Sciweavers

780 search results - page 114 / 156
» A Comparative Analysis of Selection Schemes Used in Genetic ...
Sort
View
INFOCOM
2011
IEEE
13 years 6 days ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
ISLPED
2003
ACM
129views Hardware» more  ISLPED 2003»
14 years 2 months ago
A critical analysis of application-adaptive multiple clock processors
Enabled by the continuous advancement in fabrication technology, present day synchronous microprocessors include more than 100 million transistors and have clock speeds well in ex...
Emil Talpes, Diana Marculescu
CVPR
2005
IEEE
14 years 10 months ago
Beyond Pairwise Clustering
We consider the problem of clustering in domains where the affinity relations are not dyadic (pairwise), but rather triadic, tetradic or higher. The problem is an instance of the ...
Sameer Agarwal, Jongwoo Lim, Lihi Zelnik-Manor, Pi...
WWW
2004
ACM
14 years 9 months ago
Remindin': semantic query routing in peer-to-peer networks based on social metaphors
In peer-to-peer networks, finding the appropriate answer for an information request, such as the answer to a query for RDF(S) data, depends on selecting the right peer in the netw...
Christoph Tempich, Steffen Staab, Adrian Wranik
BMCBI
2010
201views more  BMCBI 2010»
13 years 9 months ago
Analysis of X-ray Structures of Matrix Metalloproteinases via Chaotic Map Clustering
Background: Matrix metalloproteinases (MMPs) are well-known biological targets implicated in tumour progression, homeostatic regulation, innate immunity, impaired delivery of pro-...
Ilenia Giangreco, Orazio Nicolotti, Angelo Carotti...