Sciweavers

2715 search results - page 179 / 543
» Network bucket testing
Sort
View
ACSW
2006
13 years 10 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
JMLR
2010
116views more  JMLR 2010»
13 years 4 months ago
Feature Selection, Association Rules Network and Theory Building
As the size and dimensionality of data sets increase, the task of feature selection has become increasingly important. In this paper we demonstrate how association rules can be us...
Sanjay Chawla
ATAL
2009
Springer
14 years 3 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
GECCO
2009
Springer
14 years 3 months ago
Multiobjectivization for parameter estimation: a case-study on the segment polarity network of drosophila
Mathematical modeling for gene regulative networks (GRNs) provides an effective tool for hypothesis testing in biology. A necessary step in setting up such models is the estimati...
Tim Hohm, Eckart Zitzler
BMCBI
2010
146views more  BMCBI 2010»
13 years 9 months ago
On the Choice and Number of Microarrays for Transcriptional Regulatory Network Inference
Background: Transcriptional regulatory network inference (TRNI) from large compendia of DNA microarrays has become a fundamental approach for discovering transcription factor (TF)...
Elissa J. Cosgrove, Timothy S. Gardner, Eric D. Ko...