Sciweavers

2778 search results - page 533 / 556
» Limit complexities revisited
Sort
View
COMCOM
2006
194views more  COMCOM 2006»
15 years 4 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
COMCOM
2006
88views more  COMCOM 2006»
15 years 4 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
BMCBI
2007
120views more  BMCBI 2007»
15 years 4 months ago
Quantitative sequence-function relationships in proteins based on gene ontology
Background: The relationship between divergence of amino-acid sequence and divergence of function among homologous proteins is complex. The assumption that homologs share function...
Vineet Sangar, Daniel J. Blankenberg, Naomi Altman...
IJMMS
2008
72views more  IJMMS 2008»
15 years 4 months ago
Zoom interaction design for pen-operated portable devices
Maps are currently the most common application domain for ZUIs. Standard techniques for controlling such interfaces on pen-operated devices usually rely on sequential interaction,...
Thorsten Büring, Jens Gerken, Harald Reiterer
CN
2007
146views more  CN 2007»
15 years 4 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...