Sciweavers

357 search results - page 63 / 72
» A logic-based framework for attribute based access control
Sort
View
ICDCS
2005
IEEE
14 years 1 months ago
Handling Asymmetry in Power Heterogeneous Ad Hoc Networks: A Cross Layer Approach
Power heterogeneous ad hoc networks are characterized by link layer asymmetry: the ability of lower power nodes to receive transmissions from higher power nodes but not vice versa...
Vasudev Shah, Srikanth V. Krishnamurthy
BMCBI
2007
114views more  BMCBI 2007»
13 years 7 months ago
Large scale statistical inference of signaling pathways from RNAi and microarray data
Background: The advent of RNA interference techniques enables the selective silencing of biologically interesting genes in an efficient way. In combination with DNA microarray tec...
Holger Fröhlich, Mark Fellmann, Holger Sü...
WWW
2003
ACM
14 years 8 months ago
An Application for WebDAV-based Authoring of Databases - WebDAD
We propose a new approach to accessing databases through the Web that is based on the WebDAV protocol (Web-based Distributed Authoring and Versioning). This paper introduces an ex...
Bita Shadgar, Ian Holyer
INFOCOM
2008
IEEE
14 years 1 months ago
CTU: Capturing Throughput Dependencies in UWB Networks
—The inherent channel characteristics of impulse-based UWB networks affect the MAC layer performance significantly. Previous studies on evaluating MAC protocols are based on pro...
Ioannis Broustis, Aggelos Vlavianos, Prashant Kris...
RAID
2004
Springer
14 years 25 days ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem