Sciweavers

9015 search results - page 1654 / 1803
» Using Structural Computing to Support Information Integratio...
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 8 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
SPRINGSIM
2008
15 years 4 months ago
Implementation by simulation; strategies for ultrasound screening for hip dysplasia in the Netherlands
Background: Implementation of medical interventions may vary with organization and available capacity. The influence of this source of variability on the cost-effectiveness can be...
Sabrina Ramwadhdoebe, Godefridus G. van Merode, Ma...
BIOINFORMATICS
2008
172views more  BIOINFORMATICS 2008»
15 years 2 months ago
Fitting a geometric graph to a protein-protein interaction network
Motivation: Finding a good network null model for protein-protein interaction (PPI) networks is a fundamental issue. Such a model would provide insights into the interplay between...
Desmond J. Higham, Marija Rasajski, Natasa Przulj
WWW
2009
ACM
16 years 3 months ago
Smart Miner: a new framework for mining large scale web usage data
In this paper, we propose a novel framework called SmartMiner for web usage mining problem which uses link information for producing accurate user sessions and frequent navigation...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar...
145
Voted
TPHOL
1997
IEEE
15 years 6 months ago
An Isabelle-Based Theorem Prover for VDM-SL
This note lists references which address –in some way or another– the problems relating to formal manipulation of logical expressions where terms can fail to denote. Reference...
Sten Agerholm, Jacob Frost
« Prev « First page 1654 / 1803 Last » Next »