Sciweavers

683 search results - page 136 / 137
» Unique Group Signatures
Sort
View
128
Voted
CASES
2010
ACM
15 years 22 days ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
154
Voted
IDA
2009
Springer
15 years 13 days ago
Hierarchical Extraction of Independent Subspaces of Unknown Dimensions
Abstract. Independent Subspace Analysis (ISA) is an extension of Independent Component Analysis (ICA) that aims to linearly transform a random vector such as to render groups of it...
Peter Gruber, Harold W. Gutch, Fabian J. Theis
133
Voted
FUIN
2010
136views more  FUIN 2010»
15 years 2 days ago
Modeling Biology using Generic Reactive Animation
Abstract. Complex biological systems involve incorporated behaviors of numerous processes, mechanisms and objects. However, experimental analysis, by its nature, divides biological...
Yaki Setty, Irun R. Cohen, David Harel
129
Voted
BMCBI
2010
117views more  BMCBI 2010»
14 years 9 months ago
Screensaver: an open source lab information management system (LIMS) for high throughput screening facilities
Background: Shared-usage high throughput screening (HTS) facilities are becoming more common in academe as large-scale small molecule and genome-scale RNAi screening strategies ar...
Andrew N. Tolopko, John P. Sullivan, Sean D. Erick...
120
Voted
JOCN
2011
94views more  JOCN 2011»
14 years 9 months ago
ERP Correlates of Word Production before and after Stroke in an Aphasic Patient
■ Changes in brain activity characterizing impaired speech production after brain damage have usually been investigated by comparing aphasic speakers with healthy subjects becau...
Marina Laganaro, Stéphanie Morand, Christop...