Sciweavers

1018 search results - page 199 / 204
» Remote User Authentication Using Public Information
Sort
View
EDBTW
2010
Springer
14 years 2 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
MSWIM
2009
ACM
14 years 2 months ago
An enhanced mechanism for efficient assignment of multiple MBMS sessions towards LTE
The provision of rich multimedia services, such as Mobile TV, is considered of key importance for the Long Term Evolution (LTE) proliferation in mobile market. To this direction, ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
BMCBI
2010
187views more  BMCBI 2010»
13 years 7 months ago
PathEx: a novel multi factors based datasets selector web tool
Background: Microarray experiments have become very popular in life science research. However, if such experiments are only considered independently, the possibilities for analysi...
Eric Bareke, Michael Pierre, Anthoula Gaigneaux, B...
BMCBI
2007
148views more  BMCBI 2007»
13 years 7 months ago
Blast sampling for structural and functional analyses
Background: The post-genomic era is characterised by a torrent of biological information flooding the public databases. As a direct consequence, similarity searches starting with ...
Anne Friedrich, Raymond Ripp, Nicolas Garnier, Emm...
NAR
2008
122views more  NAR 2008»
13 years 7 months ago
PlantTFDB: a comprehensive plant transcription factor database
Transcription factors (TFs) play key roles in controlling gene expression. Systematic identification and annotation of TFs, followed by construction of TF databases may serve as u...
Anyuan Guo, Xin Chen, Ge Gao, He Zhang, Qihui Zhu,...