Sciweavers

23703 search results - page 4741 / 4741
» Learning from Demonstration
Sort
View
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 5 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
BIOINFORMATICS
2005
134views more  BIOINFORMATICS 2005»
13 years 5 months ago
Outcome signature genes in breast cancer: is there a unique set?
Motivation: direct bearing whose expres Sorlie et al., 2 gene sets is a diseases (Lossos et al., 2004; Miklos and Maleszka, 2004), and the variables that could account questions i...
Liat Ein-Dor, Itai Kela, Gad Getz, David Givol, Ey...
TMI
2010
167views more  TMI 2010»
13 years 1 days ago
Two-Dimensional Intraventricular Flow Mapping by Digital Processing Conventional Color-Doppler Echocardiography Images
Abstract--Doppler echocardiography remains the most extended clinical modality for the evaluation of left ventricular (LV) function. Current Doppler ultrasound methods, however, ar...
Damien Garcia, Juan C. del Álamo, David Tan...
« Prev « First page 4741 / 4741 Last » Next »