Sciweavers

17450 search results - page 424 / 3490
» Numerical Methods with Applications
Sort
View
COMPSEC
2000
117views more  COMPSEC 2000»
15 years 4 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
ENDM
2000
131views more  ENDM 2000»
15 years 4 months ago
Some Topological Methods in Graph Coloring Theory
Attempts to solve the famous Four Color Problem led to fruitful discoveries and rich coloring theories. In this talk, some old and some recent applications of tools from topology ...
Bojan Mohar
117
Voted
JCAL
2000
80views more  JCAL 2000»
15 years 4 months ago
An activity-based analysis of hands-on practice methods
The success of exploration-based training is likely to be strongly influenced by what activities the learner undertakes during training. This paper presents a study of the activiti...
Susan Wiedenbeck, J. A. Zavala, Jason Nawyn
HCI
2009
15 years 2 months ago
Changes of HCI Methods towards the Development Process of Wearable Computing Solutions
Logistics is a dynamic and heterogeneous application area for wearable computing. In this paper, wearable computing technologies are examined as basis for a support system for mobi...
Ingrid Rügge, Carmen Ruthenbeck, Bernd Scholz...
172
Voted
BMCBI
2010
214views more  BMCBI 2010»
15 years 5 months ago
AutoSOME: a clustering method for identifying gene expression modules without prior knowledge of cluster number
Background: Clustering the information content of large high-dimensional gene expression datasets has widespread application in "omics" biology. Unfortunately, the under...
Aaron M. Newman, James B. Cooper