Sciweavers

7280 search results - page 1443 / 1456
» Optimization Techniques
Sort
View
TWC
2008
154views more  TWC 2008»
14 years 11 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
BMCBI
2004
150views more  BMCBI 2004»
14 years 10 months ago
SS-Wrapper: a package of wrapper applications for similarity searches on Linux clusters
Background: Large-scale sequence comparison is a powerful tool for biological inference in modern molecular biology. Comparing new sequences to those in annotated databases is a u...
Chunlin Wang, Elliot J. Lefkowitz
CGF
2004
133views more  CGF 2004»
14 years 10 months ago
SMARTPAPER: An Interactive and User Friendly Sketching System
This paper describes an interactive sketching system for 3D design/modeling that diverts from the conventional menu and button interfaces of CAD tools. The system, dubbed SMARTPAP...
Amit Shesh, Baoquan Chen
BIOINFORMATICS
2007
190views more  BIOINFORMATICS 2007»
14 years 10 months ago
Towards clustering of incomplete microarray data without the use of imputation
Motivation: Clustering technique is used to find groups of genes that show similar expression patterns under multiple experimental conditions. Nonetheless, the results obtained by...
Dae-Won Kim, Ki Young Lee, Kwang H. Lee, Doheon Le...
CN
2002
77views more  CN 2002»
14 years 10 months ago
Architecture of a Web server accelerator
We describe the design, implementation and performance of a high-performance Web server accelerator which runs on an embedded operating system and improves Web server performance ...
Junehwa Song, Arun Iyengar, Eric Levy-Abegnoli, Da...
« Prev « First page 1443 / 1456 Last » Next »