Sciweavers

15351 search results - page 2693 / 3071
» The information bottleneck method
Sort
View
IAJIT
2008
145views more  IAJIT 2008»
15 years 4 months ago
NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks
: A Mobile Ad Hoc Network (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies without...
Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Md...
BMCBI
2006
84views more  BMCBI 2006»
15 years 4 months ago
Representation of target-bound drugs by computed conformers: implications for conformational libraries
Background: The increasing number of known protein structures provides valuable information about pharmaceutical targets. Drug binding sites are identifiable and suitable lead com...
Stefan Günther, Christian Senger, Elke Michal...
CGF
2006
128views more  CGF 2006»
15 years 4 months ago
Computing discrete shape operators on general meshes
Discrete curvature and shape operators, which capture complete information about directional curvatures at a point, are essential in a variety of applications: simulation of defor...
Eitan Grinspun, Yotam I. Gingold, Jason Reisman, D...
CGF
2006
106views more  CGF 2006»
15 years 4 months ago
Silhouette Extraction in Hough Space
Object-space silhouette extraction is an important problem in fields ranging from non-photorealistic computer graphics to medical robotics. We present an efficient silhouette extr...
Matt Olson, Hao Zhang 0002
119
Voted
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 4 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
« Prev « First page 2693 / 3071 Last » Next »