Sciweavers

3236 search results - page 552 / 648
» Designing better phages
Sort
View
SENSYS
2004
ACM
14 years 2 months ago
The flooding time synchronization protocol
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. Thi...
Miklós Maróti, Branislav Kusy, Gyula...
SENSYS
2004
ACM
14 years 2 months ago
Versatile low power media access for wireless sensor networks
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...
Joseph Polastre, Jason L. Hill, David E. Culler
AFP
2004
Springer
105views Formal Methods» more  AFP 2004»
14 years 2 months ago
Epigram: Practical Programming with Dependent Types
Abstraction and application, tupling and projection: these provide the ‘software engineering’ superstructure for programs, and our familiar type systems ensure that these opera...
Conor McBride
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
KDD
2004
ACM
161views Data Mining» more  KDD 2004»
14 years 2 months ago
ANN quality diagnostic models for packaging manufacturing: an industrial data mining case study
World steel trade becomes more competitive every day and new high international quality standards and productivity levels can only be achieved by applying the latest computational...
Nicolás de Abajo, Alberto B. Diez, Vanesa L...