Sciweavers

329 search results - page 63 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
WSC
2000
13 years 9 months ago
Using simulation and critical points to define states in continuous search spaces
Many artificial intelligence techniques rely on the notion ate" as an abstraction of the actual state of the nd an "operator" as an abstraction of the actions that ...
Marc S. Atkin, Paul R. Cohen
EGOV
2010
Springer
13 years 8 months ago
Designing Quality Business Processes for E-Government Digital Services
Abstract. Research works and surveys focusing on e-Government Digital Services availability and usage, reveal that often services are available but ignored by citizens. In our hypo...
Flavio Corradini, Damiano Falcioni, Andrea Polini,...
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
BMCBI
2010
143views more  BMCBI 2010»
13 years 7 months ago
ETE: a python Environment for Tree Exploration
Background: Many bioinformatics analyses, ranging from gene clustering to phylogenetics, produce hierarchical trees as their main result. These are used to represent the relations...
Jaime Huerta-Cepas, Joaquín Dopazo, Toni Ga...
BMCBI
2008
125views more  BMCBI 2008»
13 years 7 months ago
Exploration and visualization of gene expression with neuroanatomy in the adult mouse brain
Background: Spatially mapped large scale gene expression databases enable quantitative comparison of data measurements across genes, anatomy, and phenotype. In most ongoing effort...
Christopher Lau, Lydia Ng, Carol Thompson, Sayan D...