Sciweavers

790 search results - page 42 / 158
» Hierarchical Group Signatures
Sort
View
BMCBI
2008
158views more  BMCBI 2008»
15 years 25 days ago
Analyzing M-CSF dependent monocyte/macrophage differentiation: Expression modes and meta-modes derived from an independent compo
Background: The analysis of high-throughput gene expression data sets derived from microarray experiments still is a field of extensive investigation. Although new approaches and ...
Dominik Lutter, Peter Ugocsai, Margot Grandl, Evel...
BMCBI
2008
134views more  BMCBI 2008»
15 years 25 days ago
Clustering cancer gene expression data: a comparative study
Background The use of clustering methods for the discovery of cancer subtypes has drawn a great deal of attention in the scientific community. While bioinformaticians have propose...
Marcílio Carlos Pereira de Souto, Ivan G. C...
TIFS
2010
130views more  TIFS 2010»
14 years 7 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
105
Voted
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 26 days ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
118
Voted
CVPR
2008
IEEE
16 years 2 months ago
ANSIG - An analytic signature for permutation-invariant two-dimensional shape representation
Many applications require a computer representation of 2D shape, usually described by a set of 2D points. The challenge of this representation is that it must not only capture the...
José J. Rodrigues, Pedro M. Q. Aguiar, Jo&a...