Sciweavers

459 search results - page 64 / 92
» Detecting induced subgraphs
Sort
View
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 7 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
ENTCS
2006
172views more  ENTCS 2006»
13 years 7 months ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas
ALMOB
2008
124views more  ALMOB 2008»
13 years 7 months ago
A scoring matrix approach to detecting miRNA target sites
Background: Experimental identification of microRNA (miRNA) targets is a difficult and time consuming process. As a consequence several computational prediction methods have been ...
Simon Moxon, Vincent Moulton, Jan T. Kim
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
14 years 8 months ago
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, mal...
Christof Paar, Lang Lin, Markus Kasper, Tim Gü...
SOSP
2009
ACM
14 years 4 months ago
Tolerating hardware device failures in software
Hardware devices can fail, but many drivers assume they do not. When confronted with real devices that misbehave, these assumptions can lead to driver or system failures. While ma...
Asim Kadav, Matthew J. Renzelmann, Michael M. Swif...