Sciweavers

7891 search results - page 1440 / 1579
» Local Area Networking
Sort
View
BMCBI
2010
109views more  BMCBI 2010»
13 years 11 months ago
Application of machine learning methods to histone methylation ChIP-Seq data reveals H4R3me2 globally represses gene expression
Background: In the last decade, biochemical studies have revealed that epigenetic modifications including histone modifications, histone variants and DNA methylation form a comple...
Xiaojiang Xu, Stephen Hoang, Marty W. Mayo, Stefan...
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 11 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
JUCS
2008
113views more  JUCS 2008»
13 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
NN
2008
Springer
158views Neural Networks» more  NN 2008»
13 years 10 months ago
Improved mapping of information distribution across the cortical surface with the support vector machine
The early visual cortices represent information of several stimulus attributes, such as orientation and color. To understand the coding mechanisms of these attributes in the brain...
Youping Xiao, Ravi Rao, Guillermo A. Cecchi, Ehud ...
TASE
2008
IEEE
13 years 10 months ago
Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design
In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent...
Dinesh Garg, Y. Narahari
« Prev « First page 1440 / 1579 Last » Next »