Sciweavers

2631 search results - page 239 / 527
» Less is More
Sort
View
ICIS
2004
15 years 4 months ago
Opting-in or Opting-out on the Internet: Does it Really Matter?
Personal privacy has become one of the pressure points that comprises utmost primacy in the scientific community. An often debated privacy issue concerns the means of soliciting c...
Yee-Lin Lai, Kai Lung Hui
BMCBI
2005
120views more  BMCBI 2005»
15 years 3 months ago
pSLIP: SVM based protein subcellular localization prediction using multiple physicochemical properties
Background: Protein subcellular localization is an important determinant of protein function and hence, reliable methods for prediction of localization are needed. A number of pre...
Deepak Sarda, Gek Huey Chua, Kuo-Bin Li, Arun Kris...
JSS
2002
84views more  JSS 2002»
15 years 2 months ago
The impact of component architectures on interoperability
Component interoperability has become an important concern as companies migrate legacy systems, integrate COTS products, and assemble modules from disparate sources into a single ...
Leigh A. Davis, Rose F. Gamble, Jamie Payton
ACMSE
2010
ACM
15 years 1 months ago
Mining relaxed closed subspace clusters
This paper defines and discusses a new problem in the area of subspace clustering. It defines the problem of mining closed subspace clusters. This new concept allows for the culli...
Erich Allen Peterson, Peiyi Tang
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao