Sciweavers

438 search results - page 48 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
ICNP
2002
IEEE
14 years 17 days ago
A Theory of Window-Based Unicast Congestion Control
This work presents a comprehensive theoretical framework for window-based congestion control protocols that are designed to converge to fairness and efficiency. We first derive ...
Nishanth R. Sastry, Simon S. Lam
BMCBI
2008
155views more  BMCBI 2008»
13 years 7 months ago
Extending pathways based on gene lists using InterPro domain signatures
Background: High-throughput technologies like functional screens and gene expression analysis produce extended lists of candidate genes. Gene-Set Enrichment Analysis is a commonly...
Florian Hahne, Alexander Mehrle, Dorit Arlt, Annem...
ICB
2009
Springer
412views Biometrics» more  ICB 2009»
14 years 2 months ago
Bayesian Face Recognition Based on Markov Random Field Modeling
In this paper, a Bayesian method for face recognition is proposed based on Markov Random Fields (MRF) modeling. Constraints on image features as well as contextual relationships be...
Rui Wang, Zhen Lei, Meng Ao, Stan Z. Li
CORR
2008
Springer
149views Education» more  CORR 2008»
13 years 6 months ago
MIMO Networks: the Effects of Interference
Multiple-input multiple-output (MIMO) systems are being considered as one of the key enabling technologies for future wireless networks. However, the decrease in capacity due to th...
Marco Chiani, Moe Z. Win, Hyundong Shin
VISUALIZATION
2002
IEEE
14 years 16 days ago
Computing Singularities of 3D Vector Fields with Geometric Algebra
Critical points of a vector field are key to their characterization. Not only their positions but also their indexes are crucial for understanding vector fields. Considerable wo...
Stephen Mann, Alyn P. Rockwood