Sciweavers

17582 search results - page 3438 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
118
Voted
RAID
2010
Springer
15 years 2 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
SUTC
2010
IEEE
15 years 2 months ago
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks
—Compressed Sensing (CS) is a novel sampling paradigm that tries to take data-compression concepts down to the sampling layer of a sensory system. It states that discrete compres...
Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Nee...
IMC
2010
ACM
15 years 2 months ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
ICISS
2009
Springer
15 years 1 months ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....
BMCBI
2010
108views more  BMCBI 2010»
15 years 1 months ago
Prediction of RNA secondary structure by maximizing pseudo-expected accuracy
Background: Recent studies have revealed the importance of considering the entire distribution of possible secondary structures in RNA secondary structure predictions; therefore, ...
Michiaki Hamada, Kengo Sato, Kiyoshi Asai
« Prev « First page 3438 / 3517 Last » Next »