Sciweavers

9841 search results - page 1906 / 1969
» Task-Centred Information Management
Sort
View
TISSEC
2008
202views more  TISSEC 2008»
14 years 10 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
IVS
2007
120views more  IVS 2007»
14 years 10 months ago
Visual exploration and analysis of historic hotel visits
Understanding the spatial and temporal characteristics of individual and group behavior in social networks is a critical component of visual tools for intelligence analysis, emerg...
Chris Weaver, David Fyfe, Anthony Robinson, Deryck...
BMCBI
2005
94views more  BMCBI 2005»
14 years 10 months ago
Workflows in bioinformatics: meta-analysis and prototype implementation of a workflow generator
Background: Computational methods for problem solving need to interleave information access and algorithm execution in a problem-specific workflow. The structures of these workflo...
Alexander García Castro, Samuel Thoraval, L...
JCB
2007
106views more  JCB 2007»
14 years 10 months ago
Clustered Sequence Representation for Fast Homology Search
We present a novel approach to managing redundancy in sequence databanks such as GenBank. We store clusters of near-identical sequences as a representative union-sequence and a se...
Michael Cameron, Yaniv Bernstein, Hugh E. Williams
77
Voted
JCM
2007
143views more  JCM 2007»
14 years 10 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
« Prev « First page 1906 / 1969 Last » Next »