Sciweavers

1466 search results - page 133 / 294
» Completeness of the Authentication Tests
Sort
View
BMCBI
2008
134views more  BMCBI 2008»
13 years 8 months ago
Prediction of protein-protein binding site by using core interface residue and support vector machine
Background: The prediction of protein-protein binding site can provide structural annotation to the protein interaction data from proteomics studies. This is very important for th...
Nan Li, Zhonghua Sun, Fan Jiang
BMCBI
2006
118views more  BMCBI 2006»
13 years 8 months ago
Identification of gene expression patterns using planned linear contrasts
Background: In gene networks, the timing of significant changes in the expression level of each gene may be the most critical information in time course expression profiles. With ...
Hao Li, Constance L. Wood, Yushu Liu, Thomas V. Ge...
MOBIHOC
2009
ACM
14 years 8 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 8 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
CCS
2010
ACM
14 years 2 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall