Sciweavers

598 search results - page 23 / 120
» Interpolation Mechanism of Functional Networks
Sort
View
CONEXT
2008
ACM
15 years 5 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
127
Voted
POPL
2010
ACM
16 years 25 days ago
Dependent Types from Counterexamples
d by recent research in abstract model checking, we present a new approach to inferring dependent types. Unlike many of the existing approaches, our approach does not rely on prog...
Tachio Terauchi
BMCBI
2004
207views more  BMCBI 2004»
15 years 3 months ago
Computational identification of transcription factor binding sites by functional analysis of sets of genes sharing overrep-resen
Background: Transcriptional regulation is a key mechanism in the functioning of the cell, and is mostly effected through transcription factors binding to specific recognition moti...
Davide Corà, Ferdinando Di Cunto, Paolo Pro...
136
Voted
ICIP
2008
IEEE
16 years 5 months ago
Peer-to-peer multicast live video streaming with interactive virtual pan/tilt/zoom functionality
Video streaming with virtual pan/tilt/zoom functionality allows the viewer to watch arbitrary regions of a high-spatial-resolution scene. In our proposed system, the user controls...
Aditya Mavlankar, Jeonghun Noh, Pierpaolo Bacciche...
132
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
A Hash Function Scheme for Key Management in UMTS MBMS
—3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service ...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin