Sciweavers

14424 search results - page 2784 / 2885
» Modeling Radio Networks
Sort
View
125
Voted
WS
2010
ACM
15 years 28 days ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...
140
Voted
CCS
2010
ACM
15 years 18 days ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
103
Voted
CONEXT
2010
ACM
15 years 17 days ago
Is content publishing in BitTorrent altruistic or profit-driven?
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity ...
Rubén Cuevas Rumín, Michal Kryczka, ...
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 13 days ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
148
Voted
BMCBI
2010
155views more  BMCBI 2010»
15 years 39 min ago
BrEPS: a flexible and automatic protocol to compute enzyme-specific sequence profiles for functional annotation
Background: Models for the simulation of metabolic networks require the accurate prediction of enzyme function. Based on a genomic sequence, enzymatic functions of gene products a...
Constantin Bannert, A. Welfle, C. aus dem Spring, ...
« Prev « First page 2784 / 2885 Last » Next »