Sciweavers

517 search results - page 102 / 104
» Bit Encryption Is Complete
Sort
View
BMCBI
2007
174views more  BMCBI 2007»
13 years 7 months ago
ESTuber db: an online database for Tuber borchii EST sequences
Background: The ESTuber database (http://www.itb.cnr.it/estuber) includes 3,271 Tuber borchii expressed sequence tags (EST). The dataset consists of 2,389 sequences from an in-hou...
Barbara Lazzari, Andrea Caprera, Cristian Cosentin...
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 7 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Hierarchical routing over dynamic wireless networks
Dynamic networks are those where the topology changes over time and therefore efficient routes need to be maintained by frequent updates. Such updates could be costly in terms of ...
Dominique Tschopp, Suhas N. Diggavi, Matthias Gros...
IJMMS
2007
195views more  IJMMS 2007»
13 years 7 months ago
Berlin Brain-Computer Interface - The HCI communication channel for discovery
The investigation of innovative Human–Computer Interfaces (HCI) provides a challenge for future interaction research and development. Brain–Computer Interfaces (BCIs) exploit ...
Roman Krepki, Gabriel Curio, Benjamin Blankertz, K...
TC
2008
13 years 7 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park