Sciweavers

2089 search results - page 417 / 418
» Finding Environment Guarantees
Sort
View
IJNSEC
2010
163views more  IJNSEC 2010»
13 years 2 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
JBI
2010
212views Bioinformatics» more  JBI 2010»
13 years 2 months ago
Cloud computing: A new business paradigm for biomedical information sharing
We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called cloud computing. Clou...
Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Sta...
JOCN
2010
136views more  JOCN 2010»
13 years 2 months ago
Music and Speech Listening Enhance the Recovery of Early Sensory Processing after Stroke
Our surrounding auditory environment has a dramatic influence on the development of basic auditory and cognitive skills, but little is known about how it influences the recovery o...
Teppo Särkämö, Elina Pihko, Sari La...
JORS
2010
189views more  JORS 2010»
13 years 2 months ago
Monte Carlo scenario generation for retail loan portfolios
Monte Carlo simulation is a common method for studying the volatility of market traded instruments. It is less employed in retail lending, because of the inherent nonlinearities in...
J. L. Breeden, D. Ingram
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...