As computing technologies in examination rooms become a more pervasive and dominant part of the healthcare experience, those technologies can disrupt the flow of information and e...
Amanda Fonville, Eun Kyoung Choe, Susan Oldham, Ju...
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Background: Circadian rhythms are 24 hour oscillations in many behavioural, physiological, cellular and molecular processes that are controlled by an endogenous clock which is ent...
Meric A. Ovacik, Siddharth Sukumaran, Richard R. A...
Background: High throughput methods of the genome era produce vast amounts of data in the form of gene lists. These lists are large and difficult to interpret without advanced com...
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...