Sciweavers

551 search results - page 70 / 111
» Preventing existence
Sort
View
IJEH
2008
120views more  IJEH 2008»
14 years 11 months ago
Facilitating superior chronic disease management through a knowledge-based systems development model
To date the adoption and diffusion of technology enabled solutions to deliver better healthcare has been slow. There are many reasons for this. One of the most significant is that...
Nilmini Wickramasinghe, Steve Goldberg
IJES
2008
102views more  IJES 2008»
14 years 11 months ago
Alternative application-specific processor architectures for fast arbitrary bit permutations
Block ciphers are used to encrypt data and provide data confidentiality. For interoperability reasons, it is desirable to support a variety of block ciphers efficiently. Of the bas...
Zhijie Jerry Shi, Xiao Yang, Ruby B. Lee
CN
2007
172views more  CN 2007»
14 years 11 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
JCP
2008
104views more  JCP 2008»
14 years 11 months ago
Analysis and Improved Recognition of Protein Names Using Transductive SVM
We first analyzed protein names using various dictionaries and databases and found five problems with protein names; i.e., the treatment of special characters, the treatment of hom...
Masaki Murata, Tomohiro Mitsumori, Kouichi Doi
JSAC
2008
108views more  JSAC 2008»
14 years 11 months ago
Collision-aware design of rate adaptation for multi-rate 802.11 WLANs
One of the key challenges in designing a rate adaptation scheme for IEEE 802.11 wireless LANs (WLANs) is to differentiate bit errors from link-layer collisions. Many recent rate a...
Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Pa...