Sciweavers

9841 search results - page 1906 / 1969
» Task-Centred Information Management
Sort
View
111
Voted
TISSEC
2008
202views more  TISSEC 2008»
15 years 13 days ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
103
Voted
IVS
2007
120views more  IVS 2007»
15 years 13 days ago
Visual exploration and analysis of historic hotel visits
Understanding the spatial and temporal characteristics of individual and group behavior in social networks is a critical component of visual tools for intelligence analysis, emerg...
Chris Weaver, David Fyfe, Anthony Robinson, Deryck...
BMCBI
2005
94views more  BMCBI 2005»
15 years 13 days ago
Workflows in bioinformatics: meta-analysis and prototype implementation of a workflow generator
Background: Computational methods for problem solving need to interleave information access and algorithm execution in a problem-specific workflow. The structures of these workflo...
Alexander García Castro, Samuel Thoraval, L...
82
Voted
JCB
2007
106views more  JCB 2007»
15 years 13 days ago
Clustered Sequence Representation for Fast Homology Search
We present a novel approach to managing redundancy in sequence databanks such as GenBank. We store clusters of near-identical sequences as a representative union-sequence and a se...
Michael Cameron, Yaniv Bernstein, Hugh E. Williams
97
Voted
JCM
2007
143views more  JCM 2007»
15 years 13 days ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
« Prev « First page 1906 / 1969 Last » Next »