Sciweavers

9841 search results - page 1951 / 1969
» Distributed Value Functions
Sort
View
TWC
2008
154views more  TWC 2008»
14 years 9 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
AI
2002
Springer
14 years 9 months ago
Using similarity criteria to make issue trade-offs in automated negotiations
Automated negotiation is a key form of interaction in systems that are composed of multiple autonomous agents. The aim of such interactions is to reach agreements through an itera...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...
BMCBI
2004
265views more  BMCBI 2004»
14 years 9 months ago
ASAView: Database and tool for solvent accessibility representation in proteins
Background: Accessible surface area (ASA) or solvent accessibility of amino acids in a protein has important implications. Knowledge of surface residues helps in locating potentia...
Shandar Ahmad, M. Michael Gromiha, Hamed Fawareh, ...
BMCBI
2004
106views more  BMCBI 2004»
14 years 9 months ago
Spotting effect in microarray experiments
Background: Microarray data must be normalized because they suffer from multiple biases. We have identified a source of spatial experimental variability that significantly affects...
Tristan Mary-Huard, Jean-Jacques Daudin, Sté...
100
Voted
BMCBI
2004
95views more  BMCBI 2004»
14 years 9 months ago
PCOGR: Phylogenetic COG ranking as an online tool to judge the specificity of COGs with respect to freely definable groups of or
Background: The rapidly increasing number of completely sequenced genomes led to the establishment of the COG-database which, based on sequence homologies, assigns similar protein...
Florian Meereis, Michael Kaufmann
« Prev « First page 1951 / 1969 Last » Next »