Sciweavers

1671 search results - page 317 / 335
» Dynamic Data Warehouse Design
Sort
View
CSREASAM
2003
15 years 1 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
AHSWN
2006
206views more  AHSWN 2006»
14 years 12 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
BMCBI
2006
153views more  BMCBI 2006»
14 years 12 months ago
Discovery of time-delayed gene regulatory networks based on temporal gene expression profiling
Background: It is one of the ultimate goals for modern biological research to fully elucidate the intricate interplays and the regulations of the molecular determinants that prope...
Xia Li, Shaoqi Rao, Wei Jiang, Chuanxing Li, Yun X...
BMCBI
2006
89views more  BMCBI 2006»
14 years 12 months ago
A joint model for nonparametric functional mapping of longitudinal trajectory and time-to-event
Background: The characterization of the relationship between a longitudinal response process and a time-to-event has been a pressing challenge in biostatistical research. This has...
Min Lin, Rongling Wu
CE
2007
176views more  CE 2007»
14 years 11 months ago
Pedagogical approaches for technology-integrated science teaching
The two separate projects described have examined how teachers exploit computer-based technologies in supporting learning of science at secondary level. This paper examines how pe...
Sara Hennessy, Jocelyn Wishart, Denise Whitelock, ...