Sciweavers

2135 search results - page 126 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
ENTCS
2007
145views more  ENTCS 2007»
13 years 8 months ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...
JIB
2008
87views more  JIB 2008»
13 years 8 months ago
2.5D Visualisation of Overlapping Biological Networks
Biological data is often structured in the form of complex interconnected networks such as protein interaction and metabolic networks. In this paper, we investigate a new problem ...
David Cho Yau Fung, Seok-Hee Hong, Dirk Koschü...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 15 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
WWW
2006
ACM
14 years 9 months ago
An integrated method for social network extraction
A social network can become bases for information infrastructure in the future. It is important to extract social networks that are not biased. Providing a simple means for users ...
Tom Hope, Takuichi Nishimura, Hideaki Takeda
ANSS
2004
IEEE
14 years 13 hour ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li