Sciweavers

4164 search results - page 756 / 833
» Application and desktop sharing
Sort
View
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 8 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
TPDS
2010
199views more  TPDS 2010»
13 years 8 months ago
Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
—One of the major applications of wireless ad hoc networks is to extend the Internet coverage and support pervasive and efficient data dissemination and sharing. To reduce data a...
Yu Huang 0002, Jiannong Cao, Beihong Jin, XianPing...
EDBT
2009
ACM
165views Database» more  EDBT 2009»
13 years 7 months ago
Exploiting the power of relational databases for efficient stream processing
Stream applications gained significant popularity over the last years that lead to the development of specialized stream engines. These systems are designed from scratch with a di...
Erietta Liarou, Romulo Goncalves, Stratos Idreos
BMCBI
2010
164views more  BMCBI 2010»
13 years 7 months ago
Merged consensus clustering to assess and improve class discovery with microarray data
Background: One of the most commonly performed tasks when analysing high throughput gene expression data is to use clustering methods to classify the data into groups. There are a...
T. Ian Simpson, J. Douglas Armstrong, Andrew P. Ja...
BMCBI
2010
117views more  BMCBI 2010»
13 years 5 months ago
Screensaver: an open source lab information management system (LIMS) for high throughput screening facilities
Background: Shared-usage high throughput screening (HTS) facilities are becoming more common in academe as large-scale small molecule and genome-scale RNAi screening strategies ar...
Andrew N. Tolopko, John P. Sullivan, Sean D. Erick...