Sciweavers

6192 search results - page 1227 / 1239
» Distributed Control of Attention
Sort
View
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
MANSCI
2007
90views more  MANSCI 2007»
13 years 7 months ago
Selecting a Selection Procedure
Selection procedures are used in a variety of applications to select the best of a finite set of alternatives. ‘Best’ is defined with respect to the largest mean, but the me...
Jürgen Branke, Stephen E. Chick, Christian Sc...
BMCBI
2004
124views more  BMCBI 2004»
13 years 7 months ago
Tests for finding complex patterns of differential expression in cancers: towards individualized medicine
Background: Microarray studies in cancer compare expression levels between two or more sample groups on thousands of genes. Data analysis follows a population-level approach (e.g....
James Lyons-Weiler, Satish Patel, Michael J. Becic...
CGF
2004
203views more  CGF 2004»
13 years 7 months ago
A Biophysically-Based Spectral Model of Light Interaction with Human Skin
Despite the notable progress in physically-based rendering, there is still a long way to go before we can automatically generate predictable images of biological materials. In thi...
Aravind Krishnaswamy, Gladimir V. G. Baranoski
MICRO
2000
IEEE
176views Hardware» more  MICRO 2000»
13 years 7 months ago
An Advanced Optimizer for the IA-64 Architecture
level of abstraction, compared with the program representation for scalar optimizations. For example, loop unrolling and loop unrolland-jam transformations exploit the large regist...
Rakesh Krishnaiyer, Dattatraya Kulkarni, Daniel M....
« Prev « First page 1227 / 1239 Last » Next »