Sciweavers

7195 search results - page 1349 / 1439
» On Computing Power
Sort
View
ALGOSENSORS
2007
Springer
15 years 9 months ago
Maximal Breach in Wireless Sensor Networks: Geometric Characterization and Algorithms
e for abstract modeling, algorithmic design and analysis to achieve provably efficient, scalable and fault-tolerant realizations of such huge, highly-dynamic, complex, non-conventi...
Anirvan DuttaGupta, Arijit Bishnu, Indranil Sengup...
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
156
Voted
BMCBI
2010
142views more  BMCBI 2010»
15 years 3 months ago
Discover Protein Complexes in Protein-Protein Interaction Networks Using Parametric Local Modularity
Background: Recent advances in proteomic technologies have enabled us to create detailed protein-protein interaction maps in multiple species and in both normal and diseased cells...
Jongkwang Kim, Kai Tan
153
Voted
BMCBI
2008
118views more  BMCBI 2008»
15 years 3 months ago
PseudoGeneQuest - Service for identification of different pseudogene types in the human genome
Background: Pseudogenes, nonfunctional copies of genes, evolve fast due the lack of evolutionary pressures and thus appear in several different forms. PseudoGeneQuest is an online...
Csaba P. Ortutay, Mauno Vihinen
BMCBI
2008
81views more  BMCBI 2008»
15 years 3 months ago
A perspective for biomedical data integration: Design of databases for flow cytometry
Background: The integration of biomedical information is essential for tackling medical problems. We describe a data model in the domain of flow cytometry (FC) allowing for massiv...
John Drakos, Marina Karakantza, Nicholas C. Zoumbo...
« Prev « First page 1349 / 1439 Last » Next »