Sciweavers

1170 search results - page 234 / 234
» On applying network coding to underwater sensor networks
Sort
View
SACMAT
2010
ACM
13 years 10 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
BMCBI
2010
130views more  BMCBI 2010»
13 years 5 months ago
Amino acid "little Big Bang": Representing amino acid substitution matrices as dot products of Euclidian vectors
Background: Sequence comparisons make use of a one-letter representation for amino acids, the necessary quantitative information being supplied by the substitution matrices. This ...
Karel Zimmermann, Jean-François Gibrat
BMCBI
2008
158views more  BMCBI 2008»
13 years 5 months ago
Bioinformatics in Italy: BITS2007, the fourth annual meeting of the Italian Society of Bioinformatics
spectives. A total of 149 abstracts were accepted and presented in the poster session and 31 of them were selected for oral presentation. At the opening of the meeting, Roderic Gui...
Graziano Pesole, Manuela Helmer-Citterich
BMCBI
2007
148views more  BMCBI 2007»
13 years 5 months ago
fREDUCE: Detection of degenerate regulatory elements using correlation with expression
Background: The precision of transcriptional regulation is made possible by the specificity of physical interactions between transcription factors and their cognate binding sites ...
Randy Z. Wu, Christina Chaivorapol, Jiashun Zheng,...
JSAC
2008
98views more  JSAC 2008»
13 years 5 months ago
Multiuser Detection of Sparsely Spread CDMA
Code-division multiple access (CDMA) is the basis of a family of advanced air interfaces in current and future generation networks. The benefits promised by CDMA have not been full...
Dongning Guo, Chih-Chun Wang