Sciweavers

349 search results - page 59 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
AGILEDC
2003
IEEE
14 years 1 months ago
Introducing Agile Development into Bioinformatics: An Experience Report
This experience report describes our efforts to introduce agile development techniques incrementally into our customer’s organization in the National Cancer Institute and develo...
David Kane
BMCBI
2004
131views more  BMCBI 2004»
13 years 8 months ago
Alternative mapping of probes to genes for Affymetrix chips
Background: Short oligonucleotide arrays have several probes measuring the expression level of each target transcript. Therefore the selection of probes is a key component for the...
Laurent Gautier, Morten Møller, Lennart Fri...
IWCMC
2006
ACM
14 years 2 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
PODC
2009
ACM
14 years 9 months ago
Load balancing without regret in the bulletin board model
We analyze the performance of protocols for load balancing in distributed systems based on no-regret algorithms from online learning theory. These protocols treat load balancing a...
Éva Tardos, Georgios Piliouras, Robert D. K...
DIALM
2007
ACM
144views Algorithms» more  DIALM 2007»
14 years 15 days ago
Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures
Reliable broadcast can be a very useful primitive for many distributed applications, especially in the context of sensoractuator networks. Recently, the issue of reliable broadcas...
Vartika Bhandari, Nitin H. Vaidya