Sciweavers

13593 search results - page 2690 / 2719
» Performance Analysis of MD5
Sort
View
AES
2008
Springer
97views Cryptology» more  AES 2008»
13 years 10 months ago
Software mechanisms for extensible and scalable 3D visualization of construction operations
This paper presents research that led to the design and implementation of an extensible and scalable software framework for the dynamic 3D visualization of simulated construction ...
Vineet R. Kamat, Julio C. Martínez
BMCBI
2010
150views more  BMCBI 2010»
13 years 10 months ago
DeltaProt: a software toolbox for comparative genomics
Background: Statistical bioinformatics is the study of biological data sets obtained by new micro-technologies by means of proper statistical methods. For a better understanding o...
Steinar Thorvaldsen, Tor Flå, Nils Willassen
COMCOM
2007
149views more  COMCOM 2007»
13 years 10 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 10 months ago
Interference Channel with an Out-of-Band Relay
A Gaussian interference channel (IC) with a relay is considered. The relay is assumed to operate over an orthogonal band with respect to the underlying IC, and the overall system i...
Onur Sahin, Osvaldo Simeone, Elza Erkip
NAR
2007
124views more  NAR 2007»
13 years 10 months ago
EVEREST: a collection of evolutionary conserved protein domains
Protein domains are subunits of proteins that recur throughout the protein world. There are many definitions attempting to capture the essence of a protein domain, and several sys...
Elon Portugaly, Nathan Linial, Michal Linial
« Prev « First page 2690 / 2719 Last » Next »