Sciweavers

14850 search results - page 2927 / 2970
» The Security of
Sort
View
BMCBI
2008
99views more  BMCBI 2008»
13 years 8 months ago
CWRML: representing crop wild relative conservation and use data in XML
Background: Crop wild relatives are wild species that are closely related to crops. They are valuable as potential gene donors for crop improvement and may help to ensure food sec...
Jonathan D. Moore, Shelagh P. Kell, Jose M. Iriond...
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 8 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 8 months ago
Report on the XBase Project
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce var...
Evangelos Zirintsis, Graham N. C. Kirby, Alan Dear...
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 8 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 8 months ago
Distributed Storage Codes Meet Multiple-Access Wiretap Channels
We consider i) the overhead minimization of maximum-distance seperable (MDS) storage codes for the repair of a single failed node and ii) the total secure degrees-of-freedom (S-DoF...
Dimitris S. Papailiopoulos, Alexandros G. Dimakis
« Prev « First page 2927 / 2970 Last » Next »