Sciweavers

8486 search results - page 1659 / 1698
» Ordered Enumeration Method
Sort
View
BMCBI
2008
96views more  BMCBI 2008»
13 years 10 months ago
Mapping proteins to disease terminologies: from UniProt to MeSH
Background: Although the UniProt KnowledgeBase is not a medical-oriented database, it contains information on more than 2,000 human proteins involved in pathologies. However, thes...
Anaïs Mottaz, Yum Lina Yip, Patrick Ruch, Ann...
CN
2010
183views more  CN 2010»
13 years 10 months ago
A learning automata based scheduling solution to the dynamic point coverage problem in wireless sensor networks
The dynamic point coverage problem in wireless sensor networks is to detect some moving target points in the area of the network using as little sensor nodes as possible. One way ...
Mehdi Esnaashari, Mohammad Reza Meybodi
COMCOM
2010
129views more  COMCOM 2010»
13 years 10 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 10 months ago
GNSS-based positioning: Attacks and Countermeasures
Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to prov...
P. Papadimitratos, A. Jovanovic
CN
2008
85views more  CN 2008»
13 years 10 months ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...
« Prev « First page 1659 / 1698 Last » Next »