all access
National Institutes of Health
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Attribute-based encryption (ABE) supports the fine-grained sharing of encrypted data. In some common designs, attributes are…
While the animal rights and food justice movements are relatively young, their political unpopularity has generated a steady…
Using ontologies for the conceptual modeling of a domain of interest is becoming increasingly popular, since ontologies have a…
IEEE 802.16 protocol [1, 2] specifies two different modes of operation. The first mode of operation is the point-to-multipoint…
This paper investigates the interworking between wireless ad hoc networks and the Internet. In other words, we consider access to…
Third generation wireless networks and beyond will solicit the cooperation of heterogeneous access networks, so as to provide…
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to…
We are developing a next generation multimedia serv er that will provide the foundation for fully inter active access to…
There is currently a raging debate among OLAP vendors on the best way to provide OLAP func-tionality: Relational OLAP (ROLAP…
Chromosomes are arranged in ordered haploid sets around the centre of the metaphase plate at mitosis in several grass species and…