Several systems have been presented in the last years in order to manage the complexity of large microarray experiments. Although good results have been achieved, most systems ten...
Ivan Porro, Livia Torterolo, Luca Corradi, Marco F...
—In Ad Hoc networking, cluster-based communication protocol can reduce large amount of flooding packets in route establishment process. However, the 802.11 medium access control ...
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Purpose – This paper aims to look at a research project – StarPlane –a national dynamic photonic network controlled by grid applications. Design/methodology/approach – The...
Paola Grosso, Li Xu, Jan-Philip Velders, Cees de L...
Background: High quality sequence alignments of RNA and DNA sequences are an important prerequisite for the comparative analysis of genomic sequence data. Nucleic acid sequences, ...
Roman R. Stocsits, Ivo L. Hofacker, Claudia Fried,...