Sciweavers

14824 search results - page 2920 / 2965
» Security - Introduction
Sort
View
ADHOC
2007
109views more  ADHOC 2007»
14 years 11 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
ANOR
2010
112views more  ANOR 2010»
14 years 11 months ago
The Multi-Story Space Assignment Problem
-- The Multi-Story Space Assignment Problem (MSAP) is an innovative formulation of the multi-story facility assignment problem that allows one to model the location of departments ...
Peter M. Hahn, J. MacGregor Smith, Yi-Rong Zhu
99
Voted
BIOINFORMATICS
2007
102views more  BIOINFORMATICS 2007»
14 years 11 months ago
OmicBrowse: a browser of multidimensional omics annotations
OmicBrowse is a browser to explore multiple datasets coordinated in the multidimensional omic space integrating omics knowledge ranging from genomes to phenomes and connecting evo...
Tetsuro Toyoda, Yoshiki Mochizuki, Keith Player, N...
BMCBI
2010
178views more  BMCBI 2010»
14 years 11 months ago
CNV Workshop: an integrated platform for high-throughput copy number variation discovery and clinical diagnostics
Background: Recent studies have shown that copy number variations (CNVs) are frequent in higher eukaryotes and associated with a substantial portion of inherited and acquired risk...
Xiaowu Gai, Juan C. Perin, Kevin Murphy, Ryan O'Ha...
96
Voted
BMCBI
2010
132views more  BMCBI 2010»
14 years 11 months ago
Next generation tools for genomic data generation, distribution, and visualization
Background: With the rapidly falling cost and availability of high throughput sequencing and microarray technologies, the bottleneck for effectively using genomic analysis in the ...
David A. Nix, Tonya L. Di Sera, Brian K. Dalley, B...
« Prev « First page 2920 / 2965 Last » Next »