Sciweavers

683 search results - page 136 / 137
» Unique Group Signatures
Sort
View
CASES
2010
ACM
13 years 9 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
IDA
2009
Springer
13 years 8 months ago
Hierarchical Extraction of Independent Subspaces of Unknown Dimensions
Abstract. Independent Subspace Analysis (ISA) is an extension of Independent Component Analysis (ICA) that aims to linearly transform a random vector such as to render groups of it...
Peter Gruber, Harold W. Gutch, Fabian J. Theis
FUIN
2010
136views more  FUIN 2010»
13 years 8 months ago
Modeling Biology using Generic Reactive Animation
Abstract. Complex biological systems involve incorporated behaviors of numerous processes, mechanisms and objects. However, experimental analysis, by its nature, divides biological...
Yaki Setty, Irun R. Cohen, David Harel
BMCBI
2010
117views more  BMCBI 2010»
13 years 5 months ago
Screensaver: an open source lab information management system (LIMS) for high throughput screening facilities
Background: Shared-usage high throughput screening (HTS) facilities are becoming more common in academe as large-scale small molecule and genome-scale RNAi screening strategies ar...
Andrew N. Tolopko, John P. Sullivan, Sean D. Erick...
JOCN
2011
94views more  JOCN 2011»
13 years 5 months ago
ERP Correlates of Word Production before and after Stroke in an Aphasic Patient
■ Changes in brain activity characterizing impaired speech production after brain damage have usually been investigated by comparing aphasic speakers with healthy subjects becau...
Marina Laganaro, Stéphanie Morand, Christop...