Sciweavers

7544 search results - page 1495 / 1509
» Network Forensics Analysis
Sort
View
ADHOC
2006
86views more  ADHOC 2006»
13 years 7 months ago
Energy considerations for topology-unaware TDMA MAC protocols
Since the energy budget of mobile nodes is limited, the performance of a networking protocol for such users should be evaluated in terms of its energy efficiency, in addition to t...
Konstantinos Oikonomou, Ioannis Stavrakakis
ALGORITHMICA
2006
139views more  ALGORITHMICA 2006»
13 years 7 months ago
CONQUEST: A Coarse-Grained Algorithm for Constructing Summaries of Distributed Discrete Datasets
Abstract. In this paper we present a coarse-grained parallel algorithm, CONQUEST, for constructing boundederror summaries of high-dimensional binary attributed data in a distribute...
Jie Chi, Mehmet Koyutürk, Ananth Grama
BMCBI
2006
82views more  BMCBI 2006»
13 years 7 months ago
Selection of antisense oligonucleotides based on multiple predicted target mRNA structures
Background: Local structures of target mRNAs play a significant role in determining the efficacies of antisense oligonucleotides (ODNs), but some structure-based target site selec...
Xiaochen Bo, Shaoke Lou, Daochun Sun, Wenjie Shu, ...
BMCBI
2006
122views more  BMCBI 2006»
13 years 7 months ago
A multivariate prediction model for microarray cross-hybridization
Background: Expression microarray analysis is one of the most popular molecular diagnostic techniques in the post-genomic era. However, this technique faces the fundamental proble...
Yian A. Chen, Cheng-Chung Chou, Xinghua Lu, Elizab...
BMCBI
2006
202views more  BMCBI 2006»
13 years 7 months ago
Spectral embedding finds meaningful (relevant) structure in image and microarray data
Background: Accurate methods for extraction of meaningful patterns in high dimensional data have become increasingly important with the recent generation of data types containing ...
Brandon W. Higgs, Jennifer W. Weller, Jeffrey L. S...
« Prev « First page 1495 / 1509 Last » Next »