Sciweavers

2261 search results - page 450 / 453
» Dynamic types for authentication
Sort
View
PERCOM
2011
ACM
13 years 9 days ago
Mobile node rostering in intermittently connected passive RFID networks
— This paper focuses on the problem of rostering in intermittently connected passive RFID networks. It aims to report a list of tagged mobile nodes that appear in given intereste...
Zhipeng Yang, Hongyi Wu
CASON
2010
IEEE
13 years 8 days ago
Social Network Reduction Based on Stability
—The analysis of social networks is concentrated especially on uncovering hidden relations and properties of network members (vertices). Most of the current approaches are focuse...
Milos Kudelka, Zdenek Horak, Václav Sn&aacu...
BMCBI
2011
13 years 7 days ago
Gene set analysis for longitudinal gene expression data
Background: Gene set analysis (GSA) has become a successful tool to interpret gene expression profiles in terms of biological functions, molecular pathways, or genomic locations. ...
Ke Zhang, Haiyan Wang, Arne C. Bathke, Solomon W. ...
INFOCOM
2011
IEEE
13 years 1 days ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra
NAR
2011
215views Computer Vision» more  NAR 2011»
12 years 11 months ago
dbCRID: a database of chromosomal rearrangements in human diseases
Chromosomal rearrangement (CR) events result from abnormal breaking and rejoining of the DNA molecules, or from crossing-over between repetitive DNA sequences, and they are involv...
Fanlou Kong, Jing Zhu, Jun Wu, Jianjian Peng, Ying...