Sciweavers

7280 search results - page 1443 / 1456
» Optimization Techniques
Sort
View
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
BMCBI
2004
150views more  BMCBI 2004»
13 years 7 months ago
SS-Wrapper: a package of wrapper applications for similarity searches on Linux clusters
Background: Large-scale sequence comparison is a powerful tool for biological inference in modern molecular biology. Comparing new sequences to those in annotated databases is a u...
Chunlin Wang, Elliot J. Lefkowitz
CGF
2004
133views more  CGF 2004»
13 years 7 months ago
SMARTPAPER: An Interactive and User Friendly Sketching System
This paper describes an interactive sketching system for 3D design/modeling that diverts from the conventional menu and button interfaces of CAD tools. The system, dubbed SMARTPAP...
Amit Shesh, Baoquan Chen
BIOINFORMATICS
2007
190views more  BIOINFORMATICS 2007»
13 years 7 months ago
Towards clustering of incomplete microarray data without the use of imputation
Motivation: Clustering technique is used to find groups of genes that show similar expression patterns under multiple experimental conditions. Nonetheless, the results obtained by...
Dae-Won Kim, Ki Young Lee, Kwang H. Lee, Doheon Le...
CN
2002
77views more  CN 2002»
13 years 7 months ago
Architecture of a Web server accelerator
We describe the design, implementation and performance of a high-performance Web server accelerator which runs on an embedded operating system and improves Web server performance ...
Junehwa Song, Arun Iyengar, Eric Levy-Abegnoli, Da...
« Prev « First page 1443 / 1456 Last » Next »