Sciweavers

3377 search results - page 152 / 676
» Describing differences between databases
Sort
View
127
Voted
CCS
2003
ACM
15 years 7 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
133
Voted
BMCBI
2006
169views more  BMCBI 2006»
15 years 3 months ago
Comparative analysis of haplotype association mapping algorithms
Background: Finding the genetic causes of quantitative traits is a complex and difficult task. Classical methods for mapping quantitative trail loci (QTL) in miceuse an F2 cross b...
Phillip McClurg, Mathew T. Pletcher, Tim Wiltshire...
132
Voted
HT
2004
ACM
15 years 9 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
110
Voted
CLUSTER
2004
IEEE
15 years 7 months ago
Rolls: modifying a standard system installer to support user-customizable cluster frontend appliances
The Rocks toolkit [9], [7], [10] uses a graph-based framework to describe the configuration of all node types (termed appliances) that make up a complete cluster. With hundreds of...
Greg Bruno, Mason J. Katz, Federico D. Sacerdoti, ...
134
Voted
BMCBI
2007
129views more  BMCBI 2007»
15 years 3 months ago
A novel approach to sequence validating protein expression clones with automated decision making
Background: Whereas the molecular assembly of protein expression clones is readily automated and routinely accomplished in high throughput, sequence verification of these clones i...
Elena Taycher, Andreas Rolfs, Yanhui Hu, Dongmei Z...