Sciweavers

128 search results - page 21 / 26
» Deriving Process Networks from Nested Loop Algorithms
Sort
View
BMCBI
2006
181views more  BMCBI 2006»
13 years 7 months ago
Automatic pathway building in biological association networks
Background: Scientific literature is a source of the most reliable and comprehensive knowledge about molecular interaction networks. Formalization of this knowledge is necessary f...
Anton Yuryev, Zufar Mulyukov, Ekaterina Kotelnikov...
WS
2004
ACM
14 years 26 days ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
DSN
2009
IEEE
13 years 5 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
SIGCOMM
2009
ACM
14 years 2 months ago
SMS-based contextual web search
SMS-based web search is different from traditional web search in that the final response to a search query is limited to a very small number of bytes (typically 1-2 SMS messages...
Jay Chen, Brendan Linn, Lakshminarayanan Subramani...
WICON
2008
13 years 9 months ago
A study of MAC schemes for wireless sensor networks powered by ambient energy harvesting
Energy consumption is a perennial issue in the design of wireless sensor networks which typically rely on portable sources like batteries for power. Recent advances in ambient ene...
Zhi Ang Eu, Winston Khoon Guan Seah, Hwee Pink Tan