In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
: This paper reports on preliminary results of an explorative study of a protocol analysis of team learning while designing using in-situ data. Two measurement-based frameworks are...
Background: There are two different theories about the development of the genetic code. Woese suggested that it was developed in connection with the amino acid repertoire, while C...
Non-negative matrix factorization (NMF) is a recently developed technique for finding parts-based, linear representations of non-negative data. Although it has successfully been a...
: Described are two algorithms to find long approximate palindromes in a string, for example a DNA sequence. A simple algorithm requires O(n)space and almost always runs in O(k.n)-...