Sciweavers

271 search results - page 54 / 55
» Access control over uncertain data
Sort
View
BMCBI
2008
116views more  BMCBI 2008»
13 years 4 months ago
Gene Ontology annotations: what they mean and where they come from
To address the challenges of information integration and retrieval, the computational genomics community increasingly has come to rely on the methodology of creating annotations o...
David P. Hill, Barry Smith, Monica S. McAndrews-Hi...
CORR
2010
Springer
170views Education» more  CORR 2010»
13 years 4 months ago
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Adaptive orthogonal frequency division multiple access (OFDMA) has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wire...
William Weiliang Li, Ying Jun Zhang, Anthony Man-C...
IJDE
2006
95views more  IJDE 2006»
13 years 4 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 8 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...
JOCN
2011
141views more  JOCN 2011»
12 years 7 months ago
Changes in Events Alter How People Remember Recent Information
■ Observers spontaneously segment larger activities into smaller events. For example, “washing a car” might be segmented into “scrubbing,” “rinsing,” and “drying...
Khena M. Swallow, Deanna M. Barch, Denise Head, Co...