Sciweavers

355 search results - page 53 / 71
» Security Test Generation Using Threat Trees
Sort
View
MASCOTS
2007
13 years 11 months ago
Multiobjective Analysis in Wireless Mesh Networks
Abstract— Wireless Mesh Networks are a scalable and costeffective solution for next-generation wireless networking. In the present work, we consider the Round Weighting Problem (...
Cristiana Gomes, Gurvan Huiban
JIRS
2010
112views more  JIRS 2010»
13 years 8 months ago
Development and Evaluation of a Chase View for UAV Operations in Cluttered Environments
Civilian applications for UAVs will bring these vehicles into low flying areas cluttered with obstacles such as building, trees, power lines, and more importantly civilians. The h...
James T. Hing, Keith W. Sevcik, Paul Y. Oh
EVOW
2006
Springer
14 years 1 months ago
Hierarchical Clustering, Languages and Cancer
In this paper, we introduce a novel objective function for the hierarchical clustering of data from distance matrices, a very relevant task in Bioinformatics. To test the robustnes...
Pritha Mahata, Wagner Costa, Carlos Cotta, Pablo M...
TWC
2008
109views more  TWC 2008»
13 years 9 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
RECOMB
2009
Springer
14 years 10 months ago
How Many Bootstrap Replicates Are Necessary?
Phylogenetic Bootstrapping (BS) is a standard technique for inferring confidence values on phylogenetic trees that is based on reconstructing many trees from minor variations of th...
Nicholas D. Pattengale, Masoud Alipour, Olaf R. P....