Sciweavers

554 search results - page 31 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
SIGIR
2006
ACM
14 years 1 months ago
Probabilistic latent query analysis for combining multiple retrieval sources
Combining the output from multiple retrieval sources over the same document collection is of great importance to a number of retrieval tasks such as multimedia retrieval, web retr...
Rong Yan, Alexander G. Hauptmann
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
SRDP: Securing Route Discovery in DSR
Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered bot...
Jihye Kim, Gene Tsudik
IJDE
2007
123views more  IJDE 2007»
13 years 7 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
BMCBI
2005
145views more  BMCBI 2005»
13 years 7 months ago
CAGER: classification analysis of gene expression regulation using multiple information sources
Background: Many classification approaches have been applied to analyzing transcriptional regulation of gene expressions. These methods build models that can explain a gene's...
Jianhua Ruan, Weixiong Zhang
COMPSEC
2004
131views more  COMPSEC 2004»
13 years 7 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...