Sciweavers

859 search results - page 157 / 172
» The Changing Face of Cryptography
Sort
View
SECPERU
2006
IEEE
15 years 3 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
MSR
2006
ACM
15 years 3 months ago
Mining large software compilations over time: another perspective of software evolution
With the success of libre (free, open source) software, a new type of software compilation has become increasingly common. Such compilations, often referred to as ‘distributions...
Gregorio Robles, Jesús M. González-B...
69
Voted
CSB
2005
IEEE
167views Bioinformatics» more  CSB 2005»
15 years 3 months ago
SinicView: An Interactive Visualization Tool for Comparison of Multiple Sequence Alignment Results
In the initial stage of sequence analysis, a biologist is first faced with the questions about how to choose the best tool to align sequences of interest and how to analyze and v...
Arthur Chun-Chieh Shih, D. T. Lee, Laurent Lin, Ch...
DATE
2005
IEEE
152views Hardware» more  DATE 2005»
15 years 3 months ago
Design of Fault-Tolerant and Dynamically-Reconfigurable Microfluidic Biochips
Technology Roadmap for Semiconductors (ITRS) clearly identifies the integration of electrochemical and electrobiological techniques as one of the system-level design challenges tha...
Fei Su, Krishnendu Chakrabarty
ICRA
2005
IEEE
100views Robotics» more  ICRA 2005»
15 years 3 months ago
Improved Signal To Noise Ratio And Computational Speed For Gradient-Based Detection Algorithms
— Image gradient-based feature detectors offer great advantages over their standard edge-only equivalents. In driver support systems research, the radial symmetry detection algor...
Nick Barnes