Sciweavers

1192 search results - page 197 / 239
» Computing Weakest Readings
Sort
View
DCOSS
2008
Springer
15 years 3 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
BMCBI
2010
156views more  BMCBI 2010»
15 years 2 months ago
Evaluation of statistical methods for normalization and differential expression in mRNA-Seq experiments
Background: High-throughput sequencing technologies, such as the Illumina Genome Analyzer, are powerful new tools for investigating a wide range of biological and medical question...
James H. Bullard, Elizabeth Purdom, Kasper D. Hans...
CGA
2008
15 years 2 months ago
Mobile 3D City Maps
ion and abstraction. By the end of the 20th century, technology had advanced to the point where computerized methods had revolutionized surveying and mapmaking practices. Now, the ...
Antti Nurminen
CG
2006
Springer
15 years 2 months ago
Interactive out-of-core isosurface visualisation in time-varying data sets
We present a combination of techniques for interactive out-of-core visualisation of isosurfaces from large timedependent data sets. We make use of an index tree, computed in a pre...
Benjamin Vrolijk, Frits H. Post
ENVSOFT
2006
131views more  ENVSOFT 2006»
15 years 1 months ago
Hydrological models are so good, do we still need data?
Our ability to numerically model natural systems has progressed enormously over the last 10e20 years. During the last decade computational power has increased to the stage where w...
R. P. Silberstein