Sciweavers

3443 search results - page 682 / 689
» More Algebras for Determiners
Sort
View
TWC
2010
13 years 2 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
HICSS
2011
IEEE
210views Biometrics» more  HICSS 2011»
12 years 11 months ago
Different Paths to Broadband Access: The Impact of Governance and Policy on Broadband Diffusion in the Developed and Developing
A new digital divide is emerging both within and between nations that is due to inequalities in broadband Internet access. Our research examines the broadband digital divide by an...
David J. Yates, Girish J. Gulati, Joseph W. Weiss
ASPLOS
2011
ACM
12 years 11 months ago
MemScale: active low-power modes for main memory
Main memory is responsible for a large and increasing fraction of the energy consumed by servers. Prior work has focused on exploiting DRAM low-power states to conserve energy. Ho...
Qingyuan Deng, David Meisner, Luiz E. Ramos, Thoma...
BMCBI
2011
12 years 11 months ago
Evaluating methods for ranking differentially expressed genes applied to MicroArray Quality Control data
Background: Statistical methods for ranking differentially expressed genes (DEGs) from gene expression data should be evaluated with regard to high sensitivity, specificity, and r...
Koji Kadota, Kentaro Shimizu
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
12 years 11 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...