Sciweavers

191 search results - page 14 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
BMCBI
2008
96views more  BMCBI 2008»
13 years 8 months ago
Use of normalization methods for analysis of microarrays containing a high degree of gene effects
Background: High-throughput microarrays are widely used to study gene expression across tissues and developmental stages. Analysis of gene expression data is challenging in these ...
Terri T. Ni, William J. Lemon, Yu Shyr, Tao P. Zho...
ATAL
2004
Springer
14 years 2 months ago
Agent Community Based Peer-to-Peer Information Retrieval
This paper proposes an Agent Community based Peer-toPeer information retrieval method called ACP2P method, which uses agent communities to manage and look up information related t...
Tsunenori Mine, Daisuke Matsuno, Koichiro Takaki, ...
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 8 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
MASCOTS
2007
13 years 10 months ago
A Hierarchical Connected Dominating Set Based Clustering Algorithm for Mobile Ad Hoc Networks
— We propose a hierarchical Connected Dominating Set (CDS) based algorithm for clustering in Mobile Ad hoc Networks (MANETs). Our algorithm is an extension of our previous Connec...
Deniz Cokuslu, Kayhan Erciyes
ESORICS
2009
Springer
14 years 9 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...