Sciweavers

2244 search results - page 302 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
SASN
2004
ACM
14 years 4 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
MOBICOM
2003
ACM
14 years 4 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...
HICSS
2007
IEEE
195views Biometrics» more  HICSS 2007»
14 years 5 months ago
Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study
A qualitative study was conducted to explore how subjects use social networking sites and instant messenger to engage in interpersonal relationships. The results were used to deve...
Catherine Dwyer
BMCBI
2008
111views more  BMCBI 2008»
13 years 11 months ago
A perl package and an alignment tool for phylogenetic networks
Background: Phylogenetic networks are a generalization of phylogenetic trees that allow for the representation of evolutionary events acting at the population level, like recombin...
Gabriel Cardona, Francesc Rosselló, Gabriel...
GLOBECOM
2010
IEEE
13 years 8 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...