Sciweavers

20511 search results - page 4102 / 4103
» On the level
Sort
View
117
Voted
IJNSEC
2007
110views more  IJNSEC 2007»
15 years 1 days ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
89
Voted
TAP
2008
Springer
102views Hardware» more  TAP 2008»
15 years 1 days ago
Visualizing graphs in three dimensions
It has been known for some time that larger graphs can be interpreted if laid out in 3D and displayed with stereo and/or motion depth cues to support spatial perception. However, ...
Colin Ware, Peter Mitchell
BMCBI
2005
121views more  BMCBI 2005»
15 years 17 hour ago
Comparison of seven methods for producing Affymetrix expression scores based on False Discovery Rates in disease profiling data
Background: A critical step in processing oligonucleotide microarray data is combining the information in multiple probes to produce a single number that best captures the express...
Kerby Shedden, Wei Chen, Rork Kuick, Debashis Ghos...
NAR
2011
267views Computer Vision» more  NAR 2011»
14 years 6 months ago
EcoCyc: a comprehensive database of Escherichia coli biology
EcoCyc (http://EcoCyc.org) is a comprehensive model organism database for Escherichia coli K-12 MG1655. From the scientific literature, EcoCyc captures the functions of individual...
Ingrid M. Keseler, Julio Collado-Vides, Alberto Sa...
HPCC
2011
Springer
13 years 11 months ago
Achieving Performance and Availability Guarantees with Spot Instances
Abstract—In the Infrastructure-as-a-Service (IaaS) cloud computing market, spot instances refer to virtual servers that are rented via an auction. Spot instances allow IaaS provi...
Michele Mazzucco, Marlon Dumas
« Prev « First page 4102 / 4103 Last » Next »