Sciweavers

2028 search results - page 281 / 406
» Deriving Relation Keys from XML Keys
Sort
View
WS
2006
ACM
15 years 10 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
BMCBI
2005
131views more  BMCBI 2005»
15 years 4 months ago
Critical evaluation of the JDO API for the persistence and portability requirements of complex biological databases
Background: Complex biological database systems have become key computational tools used daily by scientists and researchers. Many of these systems must be capable of executing on...
Marko Srdanovic, Ulf Schenk, Michael Schwieger, Fa...
169
Voted
RECOMB
2004
Springer
16 years 4 months ago
A random graph approach to NMR sequential assignment
Nuclear magnetic resonance (NMR) spectroscopy allows scientists to study protein structure, dynamics and interactions in solution. A necessary first step for such applications is ...
Chris Bailey-Kellogg, Sheetal Chainraj, Gopal Pand...
BMCBI
2007
102views more  BMCBI 2007»
15 years 4 months ago
Identification of homologs in insignificant blast hits by exploiting extrinsic gene properties
Background: Homology is a key concept in both evolutionary biology and genomics. Detection of homology is crucial in fields like the functional annotation of protein sequences and...
Jos Boekhorst, Berend Snel
196
Voted
SCP
2011
305views Communications» more  SCP 2011»
14 years 11 months ago
DESOLA: An active linear algebra library using delayed evaluation and runtime code generation
Active libraries can be defined as libraries which play an active part in the compilation, in particular, the optimisation of their client code. This paper explores the implement...
Francis P. Russell, Michael R. Mellor, Paul H. J. ...