Sciweavers

434 search results - page 74 / 87
» Logical Analysis of Hash Functions
Sort
View
128
Voted
AUSDM
2008
Springer
258views Data Mining» more  AUSDM 2008»
15 years 2 months ago
wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability
Accurate and less invasive personalized predictive medicine can spare many breast cancer patients from receiving complex surgical biopsies, unnecessary adjuvant treatments and its...
Umer Khan, Hyunjung Shin, Jongpill Choi, Minkoo Ki...
IAJIT
2007
146views more  IAJIT 2007»
15 years 9 days ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
TCIAIG
2010
14 years 7 months ago
The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model
Abstract--Fingerprinting operators generate functional signatures of game players and are useful for their automated analysis independent of representation or encoding. The theory ...
Jeffrey Tsang

Source Code
2890views
16 years 8 months ago
ImageJ
"ImageJ can display, edit, analyze, process, save, and print 8-bit, 16-bit and 32-bit images. It can read many image formats including TIFF, PNG, GIF, JPEG, BMP, DICOM, FITS, ...
National Institute of Health
ADHOCNOW
2008
Springer
15 years 6 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli