Sciweavers

1356 search results - page 61 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
ISPA
2007
Springer
15 years 6 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
WABI
2009
Springer
162views Bioinformatics» more  WABI 2009»
15 years 6 months ago
Aligning Biomolecular Networks Using Modular Graph Kernels
Comparative analysis of biomolecular networks constructed using measurements from different conditions, tissues, and organisms offer a powerful approach to understanding the stru...
Fadi Towfic, M. Heather West Greenlee, Vasant Hona...
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
14 years 11 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
85
Voted
GPC
2007
Springer
15 years 6 months ago
Server-Side Parallel Data Reduction and Analysis
Abstract. Geoscience analysis is currently limited by cumbersome access and manipulation of large datasets from remote sources. Due to their data-heavy and compute-light nature, th...
Daniel L. Wang, Charles S. Zender, Stephen F. Jenk...
ISI
2006
Springer
14 years 11 months ago
Multi-document Summarization for Terrorism Information Extraction
Abstract. Counterterrorism is one of the major challenges to the society. In order to flight again the terrorists, it is very important to have a through understanding of the terro...
Fu Lee Wang, Christopher C. Yang, Xiaodong Shi