Sciweavers

8135 search results - page 1475 / 1627
» network 2008
Sort
View
160
Voted
ANSS
2008
IEEE
15 years 10 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
133
Voted
APSEC
2008
IEEE
15 years 10 months ago
Flexible Generation of Pervasive Web Services Using OSGi Declarative Services and OWL Ontologies
There is a growing trend to deploy web services in pervasive computing environments. Implementing web services on networked, embedded devices leads to a set of challenges, includi...
Klaus Marius Hansen, Weishan Zhang, João Fe...
131
Voted
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
15 years 10 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a â...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
127
Voted
BIBM
2008
IEEE
142views Bioinformatics» more  BIBM 2008»
15 years 10 months ago
Using Global Sequence Similarity to Enhance Biological Sequence Labeling
Identifying functionally important sites from biological sequences, formulated as a biological sequence labeling problem, has broad applications ranging from rational drug design ...
Cornelia Caragea, Jivko Sinapov, Drena Dobbs, Vasa...
139
Voted
BIBM
2008
IEEE
172views Bioinformatics» more  BIBM 2008»
15 years 10 months ago
Boosting Methods for Protein Fold Recognition: An Empirical Comparison
Protein fold recognition is the prediction of protein’s tertiary structure (Fold) given the protein’s sequence without relying on sequence similarity. Using machine learning t...
Yazhene Krishnaraj, Chandan K. Reddy
« Prev « First page 1475 / 1627 Last » Next »