Sciweavers

411 search results - page 58 / 83
» Technological Strategy of Using Global Positioning System: A...
Sort
View
CCS
2009
ACM
14 years 3 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
ICCS
2005
Springer
14 years 2 months ago
eMicrob: A Grid-Based Spatial Epidemiology Application
The use of Grid technologies allows us to make progress in the prediction accuracy of epidemiological patterns, epidemiological modeling, risk predictions of infectious diseases et...
Jianping Guo, Yong Xue, Chunxiang Cao, Wuchun Cao,...
BMCBI
2008
93views more  BMCBI 2008»
13 years 9 months ago
MPDA: Microarray pooled DNA analyzer
Background: Microarray-based pooled DNA experiments that combine the merits of DNA pooling and gene chip technology constitute a pivotal advance in biotechnology. This new techniq...
Hsin-Chou Yang, Mei-Chu Huang, Ling-Hui Li, Chien-...
BMCBI
2008
125views more  BMCBI 2008»
13 years 9 months ago
Tandem duplication, circular permutation, molecular adaptation: how Solanaceae resist pests via inhibitors
Background: The Potato type II (Pot II) family of proteinase inhibitors plays critical roles in the defense system of plants from Solanaceae family against pests. To better unders...
Lesheng Kong, Shoba Ranganathan
CN
2007
133views more  CN 2007»
13 years 8 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...