Sciweavers

4330 search results - page 857 / 866
» Analyzing security architectures
Sort
View
MOBICOM
2010
ACM
13 years 7 months ago
Exploiting temporal stability and low-rank structure for localization in mobile networks
Localization is a fundamental operation for many wireless networks. While GPS is widely used for location determination, it is unavailable in many environments either due to its h...
Swati Rallapalli, Lili Qiu, Yin Zhang, Yi-Chao Che...
AROBOTS
2007
129views more  AROBOTS 2007»
13 years 6 months ago
Behaviors for physical cooperation between robots for mobility improvement
— A team of small, low-cost robots instead of a single large, complex robot is useful in operations such as search and rescue, urban exploration etc. However, the performance of ...
Ashish Deshpande, Jonathan E. Luntz
BMCBI
2008
129views more  BMCBI 2008»
13 years 6 months ago
Triad pattern algorithm for predicting strong promoter candidates in bacterial genomes
Background: Bacterial promoters, which increase the efficiency of gene expression, differ from other promoters by several characteristics. This difference, not yet widely exploite...
Michael Dekhtyar, Amelie Morin, Vehary Sakanyan
BMCBI
2008
125views more  BMCBI 2008»
13 years 6 months ago
XplorSeq: A software environment for integrated management and phylogenetic analysis of metagenomic sequence data
Background: Advances in automated DNA sequencing technology have accelerated the generation of metagenomic DNA sequences, especially environmental ribosomal RNA gene (rDNA) sequen...
Daniel N. Frank
BMCBI
2010
116views more  BMCBI 2010»
13 years 6 months ago
SEQADAPT: an adaptable system for the tracking, storage and analysis of high throughput sequencing experiments
Background: High throughput sequencing has become an increasingly important tool for biological research. However, the existing software systems for managing and processing these ...
David B. Burdick, Christopher C. Cavnor, Jeremy Ha...