Sciweavers

4529 search results - page 813 / 906
» Position Based Cryptography
Sort
View
BMCBI
2007
59views more  BMCBI 2007»
15 years 1 months ago
Environment specific substitution tables for thermophilic proteins
Background: Thermophilic organisms are able to live at high temperatures ranging from 50 to > 100°C. Their proteins must be sufficiently stable to function under these extreme...
K. Mizuguchi, M. Sele, Maria Vittoria Cubellis
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 1 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
COMCOM
2007
136views more  COMCOM 2007»
15 years 1 months ago
Demand-scalable geographic multicasting in wireless sensor networks
In this paper, we focus on the challenge of demand-scalable multicast routing in wireless sensor networks. Due to the ad-hoc nature of the placement of the sensor nodes as well as...
Shibo Wu, K. Selçuk Candan
IJCSS
2006
116views more  IJCSS 2006»
15 years 1 months ago
Extracting Motor Unit Firing Information by Independent Component Analysis of Surface Electromyogram: A Preliminary Study Using
Decomposition of electromyogram (EMG) provides a valuable means of obtaining motor unit recruitment and firing rate information. The feasibility of decomposing surface EMG signals...
Ping Zhou, M. M. Lowery, W. Zev Rymer
JASIS
2006
96views more  JASIS 2006»
15 years 1 months ago
Learning to classify documents according to genre
Genre or style analysis can be used to improve results achieved using standard IR techniques. A genre class is a group of documents that are written in a similar style. Genre clas...
Aidan Finn, Nicholas Kushmerick