Sciweavers

8493 search results - page 1464 / 1699
» Implementing a distributed firewall
Sort
View
PAMI
2008
216views more  PAMI 2008»
15 years 4 months ago
Annotating Images by Mining Image Search Results
Although it has been studied for years by the computer vision and machine learning communities, image annotation is still far from practical. In this paper, we propose a novel atte...
Xin-Jing Wang, Lei Zhang 0001, Xirong Li, Wei-Ying...
ADHOC
2005
84views more  ADHOC 2005»
15 years 4 months ago
Infrastructure-based MAC in wireless mobile ad-hoc networks
- The IEEE 802.11 standard is the most popular Medium Access Control (MAC) protocol for wireless local area networks. However, in an ad-hoc environment, the Point Coordination Func...
Hossam S. Hassanein, Tiantong You, Hussein T. Mouf...
BMCBI
2005
253views more  BMCBI 2005»
15 years 4 months ago
The Use of Edge-Betweenness Clustering to Investigate Biological Function in Protein Interaction Networks
Background: This paper describes an automated method for finding clusters of interconnected proteins in protein interaction networks and retrieving protein annotations associated ...
Ruth Dunn, Frank Dudbridge, Christopher M. Sanders...
BMCBI
2005
124views more  BMCBI 2005»
15 years 4 months ago
ErmineJ: Tool for functional analysis of gene expression data sets
Background: It is common for the results of a microarray study to be analyzed in the context of biologically-motivated groups of genes such as pathways or Gene Ontology categories...
Homin K. Lee, William Braynen, Kiran Keshav, Paul ...
JIPS
2007
223views more  JIPS 2007»
15 years 4 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
« Prev « First page 1464 / 1699 Last » Next »