Sciweavers

2259 search results - page 400 / 452
» Separation and information hiding
Sort
View
EVOW
2005
Springer
14 years 2 months ago
Order Preserving Clustering over Multiple Time Course Experiments
Abstract. Clustering still represents the most commonly used technique to analyze gene expression data—be it classical clustering approaches that aim at finding biologically rel...
Stefan Bleuler, Eckart Zitzler
MSN
2005
Springer
14 years 2 months ago
Using MDS Codes for the Key Establishment of Wireless Sensor Networks
Key pre-distribution techniques for security provision of Wireless Sensor Networks (WSNs) have attracted significant interests recently. In these schemes, a relatively small numbe...
Jing Deng, Yunghsiang S. Han
HICSS
2003
IEEE
62views Biometrics» more  HICSS 2003»
14 years 2 months ago
A Study on the Impacts of Verbal Interaction in Proximate GSS Sessions
Although distributed Group Support Systems (GSS) are getting popular, there are still some limitations. One of the limitations is few substitutions for face-to-face (FTF) interact...
Tsuneki Mukahi, Gail Corbitt
WECWIS
2003
IEEE
132views ECommerce» more  WECWIS 2003»
14 years 2 months ago
Page Digest for Large-Scale Web Services
The rapid growth of the World Wide Web and the Internet has fueled interest in Web services and the Semantic Web, which are quickly becoming important parts of modern electronic c...
Daniel Rocco, David Buttler, Ling Liu
COOPIS
2002
IEEE
14 years 1 months ago
Formal Ontology Engineering in the DOGMA Approach
This paper presents a specifically database-inspired approach (called DOGMA) for engineering formal ontologies, implemented as shared resources used to express agreed formal semant...
Mustafa Jarrar, Robert Meersman