Sciweavers

1123 search results - page 180 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
BMCBI
2010
172views more  BMCBI 2010»
15 years 4 months ago
Comparison of evolutionary algorithms in gene regulatory network model inference
Background: The evolution of high throughput technologies that measure gene expression levels has created a data base for inferring GRNs (a process also known as reverse engineeri...
Alina Sîrbu, Heather J. Ruskin, Martin Crane
MOBIHOC
2004
ACM
15 years 9 months ago
An adaptive strategy for maximizing throughput in MAC layer wireless multicast
Bandwidth efficiency of wireless multicast can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. T...
Prasanna Chaporkar, Anita Bhat, Saswati Sarkar
ATVA
2006
Springer
206views Hardware» more  ATVA 2006»
15 years 7 months ago
Compositional Reasoning for Hardware/Software Co-verification
In this paper, we present and illustrate an approach to compositional reasoning for hardware/software co-verification of embedded systems. The major challenges in compositional rea...
Fei Xie, Guowu Yang, Xiaoyu Song
IPSN
2010
Springer
15 years 6 months ago
Information processing for live photo mosaic with a group of wireless image sensors
Photo tourism [11] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allo...
Fulu Li, James Barabas, Ana L. Santos
NETWORKING
2007
15 years 5 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...