Sciweavers

1964 search results - page 379 / 393
» An analysis of extensible modelling for functional genomics ...
Sort
View
JSAC
2010
194views more  JSAC 2010»
14 years 8 months ago
Burst communication by means of buffer allocation in body sensor networks: Exploiting signal processing to reduce the number of
Abstract—Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. Such platforms use inertial information of their...
Hassan Ghasemzadeh, Vitali Loseu, Sarah Ostadabbas...
INFOCOM
2011
IEEE
14 years 1 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
SIAMSC
2011
140views more  SIAMSC 2011»
14 years 13 days ago
A Fast Parallel Algorithm for Selected Inversion of Structured Sparse Matrices with Application to 2D Electronic Structure Calcu
Abstract. An efficient parallel algorithm is presented and tested for computing selected components of H−1 where H has the structure of a Hamiltonian matrix of two-dimensional la...
Lin Lin, Chao Yang, Jianfeng Lu, Lexing Ying, Wein...
TITB
2010
197views Education» more  TITB 2010»
14 years 4 months ago
Detection of left ventricular motion abnormality via information measures and Bayesian filtering
We present an original information theoretic measure of heart motion based on the Shannon's differential entropy (SDE), which allows heart wall motion abnormality detection. B...
Kumaradevan Punithakumar, Ismail Ben Ayed, Ian G. ...
70
Voted
CCS
2009
ACM
15 years 4 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson