Search
Now showing items 1-10 of 22
Computational Analysis Of Variability Of Recombination In Mice
(Computer Science & Engineering, 2008-09-17)
Rapid advances in engineering and technology have fueled research in areas such as molecular biology and genetics to a new level and thus have given birth to multidisciplinary fields like bioinformatics and computational ...
CXLEngine - A Comprehensive XML Loosely Structured Search Engine
(Computer Science & Engineering, 2008-04-22)
XML keyword search has been a widely researched area. [15] has proposed an XML semantic search engine called OOXSearch, which answers loosely structured queries. The framework of OOXSearch takes into account the semantic ...
CAP: A Context-aware Privacy Protection System For Location-based Services
(Computer Science & Engineering, 2008-09-17)
Location Based Services (LBS) are information services that provide users with customized contents, such as the nearest restaurants/hotels/clinics, retrieved from a dedicated spatial database. They make use of technologies ...
An Influenza Virus Molecular Infection Model And Discrete Event, Stochastic Simulation.
(Computer Science & Engineering, 2008-08-08)
Influenza virus is responsible for the greatest pandemic in human history causing 20 - 40 million deaths worldwide during the 1918 flu season. In 1997 fears of a future pandemic arose with the discovery of a new strain of ...
Automated Integration Of Biomedical Information For The Support Of Genome-wide Association Studies
(Computer Science & Engineering, 2008-09-17)
Genome-wide association studies of the genetic underpinnings of complex phenotypes, and human diseases in particular, have been steadily gaining momentum over the past several years. Yet, the number of polymorphic sites ...
Stepping-stone Network Attack Kit (SNEAK) For Evading Timing-based Detection Methods Under The Cloak Of Constant Rate Multimedia Streams
(Computer Science & Engineering, 2008-09-17)
With the advent of the Internet, network-based security threats have been constantly on the rise. The source of an attack could be traced by studying the system logs and the source IP address of the attack can be used to ...
An Assistive Navigation Paradigm For Semi-autonomous Wheelchairs Using Force-feedback And Goal Prediction
(Computer Science & Engineering, 2008-08-08)
As computer technology advances and facilitates an increased amount of autonomous sensing and control, the interface between the human and autonomous computer systems becomes increasingly important. This applies in particular ...
Location Privacy In Sensor Networks Against A Global Eavesdropper
(Computer Science & Engineering, 2008-09-17)
While many protocols for sensor network security provide con dentiality for
the content of messages, contextual information usually remains exposed. Such contextual
information can be exploited by an adversary to derive ...
Panda Monitoring - a System To Monitor High Performance Computing for the Atlas Experiment-Design, Development,Implementation and Deployment
(Computer Science & Engineering, 2008-04-22)
Grid resources are gaining wide importance in the wake of experiments such as ATLAS aiding in a bigger goal to understand the complexities of nature. The need for a good monitoring system is realized as grid resources are ...
The Dynamics Of Salsa: A Structured Approach To Large-scale Anonymity
(Computer Science & Engineering, 2008-09-17)
Anonymity provides a technical solution for protecting one's online privacy. Highly distributed peer-to-peer (P2P) anonymous systems should have better distribution of trust and more scalability than centralized approaches, ...