IMG

Authenticated Byzantine generals in dual failure model
International Conference on Distributed Computing and Networking, ICDCN, 2010
Core Rank : - Google Rank :-
Exploiting N-gram Importance and Wikipedia based Additional Knowledge for Improvements in GAAC based Document Clustering.
International Conference on Knowledge Discovery and Information Retrieval, KDIR, 2010
Core Rank : - Google Rank :12
Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality
International Journal on Applied Cryptography, IJACT, 2010
Core Rank : - Google Rank :-
An Effective Approach for AESOP and Guided Summarization Task.
Text Analysis Conference Workshop, TAC, 2010
Core Rank : - Google Rank :-
Interplay between (im) perfectness, synchrony and connectivity: The case of probabilistic reliable communication
Theoretical Computer Science, TCSc, 2010
Core Rank : - Google Rank :39
On the role of Hoogsteen:Hoogsteen interactions in RNA: Ab initio investigations of structures and energies
RNA Journal, RNa-J, 2010
Core Rank : - Google Rank :-
On the Role of the cis Hoogsteen:Sugar-Edge Family of Base Pairs in Platforms and Triplets—Quantum Chemical Insights into RNA Structural Biology
The Journal of Physical Chemistry B, JPCB, 2010
Core Rank : - Google Rank :60
Model for how retrograde actin flow regulates adhesion traction stresses
Journal of Physics: Condensed Matter, JP:CM, 2010
Core Rank : - Google Rank :58
Mechanistic insights from a quantitative analysis of pollen tube guidance
BMC plant biology, BMC- PB, 2010
Core Rank : - Google Rank :78
A novel approach to generate up-sampled tomographic images using combination of rotated hexagonal lattices
National Conference on Communications, NCC, 2010
Core Rank : - Google Rank :16