Sciweavers

598 search results - page 98 / 120
» Interpolation Mechanism of Functional Networks
Sort
View
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
14 years 1 days ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
CN
2008
127views more  CN 2008»
13 years 8 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
BMCBI
2005
77views more  BMCBI 2005»
13 years 8 months ago
Ontological visualization of protein-protein interactions
Background: Cellular processes require the interaction of many proteins across several cellular compartments. Determining the collective network of such interactions is an importa...
Harold J. Drabkin, Christopher Hollenbeck, David P...
MOBIHOC
2007
ACM
14 years 7 months ago
On exploiting asymmetric wireless links via one-way estimation
A substantial percentage of links in wireless networks, especially low-power ones, is asymmetric. For the low-quality direction of asymmetric links, we observe based on testbed ex...
Lifeng Sang, Anish Arora, Hongwei Zhang
ESAS
2007
Springer
14 years 2 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...