Sciweavers

1089 search results - page 74 / 218
» Randomness and Reducibility
Sort
View
CCS
2010
ACM
13 years 10 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
WINET
2010
136views more  WINET 2010»
13 years 7 months ago
Analysis of the Bluetooth device discovery protocol
Device discovery and connection establishment are fundamental to communication between two Bluetooth (BT) devices. In this paper, we give an analytical model of the time it takes f...
Goutam Chakraborty, Kshirasagar Naik, Debasish Cha...
APIN
2008
305views more  APIN 2008»
13 years 9 months ago
A generalized model for financial time series representation and prediction
Abstract Traditional financial analysis systems utilize lowlevel price data as their analytical basis. For example, a decision-making system for stock predictions regards raw price...
Depei Bao
BIBM
2008
IEEE
113views Bioinformatics» more  BIBM 2008»
14 years 3 months ago
Towards Site-Based Protein Functional Annotations
Abstract—The exact relationship between protein active centers and protein functions is unclear even after decades of intensive study. To improve the functional prediction abilit...
Seak Fei Lei, Jun Huan
ICWN
2003
13 years 10 months ago
Performance of Mobile Ad Hoc Network in Constrained Mobility Pattern
Mobile Ad Hoc Networks (MANET) performance is affected by a number of factors, eg. speed, node density. In this paper we will focus on the effect of constrained mobility on the per...
Bu-Sung Lee, Kai Juan Wong, Boon-Chong Seet, Lijua...