Background: The biological information in genomic expression data can be understood, and computationally extracted, in the context of systems of interacting molecules. The automat...
Bruz Marzolf, Eric W. Deutsch, Patrick Moss, David...
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
An automated tether system has been developed for the purpose of improving the efficiency of micro-gravity activities of fully suited astronauts. System features include gripping ...
Mark A. Minor, Christopher R. Hirschi, Robert O. A...
When designing a plant for continuous or semi-continuous processes, such as paper pulp or petrochemical production systems, engineers face very complex tasks, which are only in pa...
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...