Sciweavers

25316 search results - page 4838 / 5064
» Computational sensor networks
Sort
View
BILDMED
2007
148views Algorithms» more  BILDMED 2007»
15 years 5 months ago
Complete Digital Iconic and Textual Annotation for Mammography
This work aims to propose an interactive method for a iconic and textual annotation of digital mammograms. The suggested annotation tool consists of a semantic network to represent...
Thomas Wittenberg, Matthias Elter, Rüdiger Sc...
BIOCOMP
2008
15 years 5 months ago
Identifying Protein Flexibility by NMA
- Here proposed apriori method for identification of protein flexibility relies on one end-state conformation of the protein. This method has comparative advantage over many others...
Kresimir Sikic, Branko Jeren, Sanja Tomic
DGO
2010
119views Education» more  DGO 2010»
15 years 5 months ago
Information and transparency: learning from recovery act reporting experiences
The American Recovery and Reinvestment Act (2009) promised strict accounting of all funds spent and the publication of that information to the public in relative real-time. The fe...
Natalie Helbig, Evgeny Styrin, Donna S. Canestraro...
CAINE
2008
15 years 5 months ago
New Architecture and Protocols for Global-Scale Machine Communities
This article is about the new universal architecture which allows electronic devices of different functionalities and manufacturers, as well as on-line services, to seamlessly int...
Vladimir Krylov, N. Mikhaylov, Dmitry V. Ponomarev
CSREASAM
2008
15 years 5 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
« Prev « First page 4838 / 5064 Last » Next »