Skip to search formSkip to main contentSkip to account menu

all access

National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Attribute-based encryption (ABE) supports the fine-grained sharing of encrypted data. In some common designs, attributes are… 
2015
2015
While the animal rights and food justice movements are relatively young, their political unpopularity has generated a steady… 
2011
2011
Using ontologies for the conceptual modeling of a domain of interest is becoming increasingly popular, since ontologies have a… 
2007
2007
IEEE 802.16 protocol [1, 2] specifies two different modes of operation. The first mode of operation is the point-to-multipoint… 
Review
2002
Review
2002
This paper investigates the interworking between wireless ad hoc networks and the Internet. In other words, we consider access to… 
2002
2002
Third generation wireless networks and beyond will solicit the cooperation of heterogeneous access networks, so as to provide… 
1998
1998
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to… 
1998
1998
We are developing a next generation multimedia serv er that will provide the foundation for fully inter active access to… 
1996
1996
There is currently a raging debate among OLAP vendors on the best way to provide OLAP func-tionality: Relational OLAP (ROLAP… 
1984
1984
Chromosomes are arranged in ordered haploid sets around the centre of the metaphase plate at mitosis in several grass species and…