Sciweavers

985 search results - page 164 / 197
» Modeling and analysis of two-flow interactions in wireless n...
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
NIPS
2008
13 years 8 months ago
Mixed Membership Stochastic Blockmodels
Consider data consisting of pairwise measurements, such as presence or absence of links between pairs of objects. These data arise, for instance, in the analysis of protein intera...
Edoardo Airoldi, David M. Blei, Stephen E. Fienber...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 24 days ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
MOBIHOC
2003
ACM
14 years 20 days ago
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems
Reliable storage of data with concurrent read/write accesses (or query/update) is an ever recurring issue in distributed settings. In mobile ad hoc networks, the problem becomes e...
Jun Luo, Jean-Pierre Hubaux, Patrick Th. Eugster
CEC
2007
IEEE
13 years 11 months ago
Emergence of feedback in artificial gene regulatory networks
In this paper, we present a model for simulating the evolution of development together with a method for the analysis of emergence of negative feedback inside the regulatory networ...
Till Steiner, Lisa Schramm, Yaochu Jin, Bernhard S...