Sciweavers

87 search results - page 17 / 18
» Selection of Optimal Computing Platforms through the Suitabi...
Sort
View
ESAS
2004
Springer
13 years 11 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
BMCBI
2007
159views more  BMCBI 2007»
13 years 5 months ago
sIR: siRNA Information Resource, a web-based tool for siRNA sequence design and analysis and an open access siRNA database
Background: RNA interference has revolutionized our ability to study the effects of altering the expression of single genes in mammalian (and other) cells through targeted knockdo...
Jyoti K. Shah, Harold R. Garner, Michael A. White,...
ECCV
2008
Springer
13 years 7 months ago
Active Image Labeling and Its Application to Facial Action Labeling
For many tasks in computer vision, it is very important to produce the groundtruth data. At present, this is mostly done manually. Manual data labeling is labor-intensive and prone...
Lei Zhang, Yan Tong, Qiang Ji
ICCS
2003
Springer
13 years 11 months ago
Self-Organizing Hybrid Neurofuzzy Networks
Abstract. We introduce a concept of self-organizing Hybrid Neurofuzzy Networks (HNFN), a hybrid modeling architecture combining neurofuzzy (NF) and polynomial neural networks(PNN)....
Sung-Kwun Oh, Su-Chong Joo, Chang-Won Jeong, Hyun-...
ICNP
2000
IEEE
13 years 10 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang