Sciweavers

2261 search results - page 450 / 453
» Dynamic types for authentication
Sort
View
127
Voted
PERCOM
2011
ACM
14 years 6 months ago
Mobile node rostering in intermittently connected passive RFID networks
— This paper focuses on the problem of rostering in intermittently connected passive RFID networks. It aims to report a list of tagged mobile nodes that appear in given intereste...
Zhipeng Yang, Hongyi Wu
177
Voted
CASON
2010
IEEE
14 years 6 months ago
Social Network Reduction Based on Stability
—The analysis of social networks is concentrated especially on uncovering hidden relations and properties of network members (vertices). Most of the current approaches are focuse...
Milos Kudelka, Zdenek Horak, Václav Sn&aacu...
185
Voted
BMCBI
2011
14 years 6 months ago
Gene set analysis for longitudinal gene expression data
Background: Gene set analysis (GSA) has become a successful tool to interpret gene expression profiles in terms of biological functions, molecular pathways, or genomic locations. ...
Ke Zhang, Haiyan Wang, Arne C. Bathke, Solomon W. ...
141
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra
NAR
2011
215views Computer Vision» more  NAR 2011»
14 years 5 months ago
dbCRID: a database of chromosomal rearrangements in human diseases
Chromosomal rearrangement (CR) events result from abnormal breaking and rejoining of the DNA molecules, or from crossing-over between repetitive DNA sequences, and they are involv...
Fanlou Kong, Jing Zhu, Jun Wu, Jianjian Peng, Ying...