Sciweavers

8655 search results - page 1645 / 1731
» Trusted computing challenges
Sort
View
WS
2006
ACM
14 years 5 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
CIBCB
2005
IEEE
14 years 4 months ago
Toward Protein Structure Analysis with Self-Organizing Maps
- Establishing structure-function relationships on the proteomic scale is a unique challenge faced by bioinformatics and molecular biosciences. Large protein families represent nat...
Lutz Hamel, Gongqin Sun, Jing Zhang
CSB
2005
IEEE
210views Bioinformatics» more  CSB 2005»
14 years 4 months ago
Problem Solving Environment Approach to Integrating Diverse Biological Data Sources
Scientists face an ever-increasing challenge in investigating biological systems with high throughput experimental methods such as mass spectrometry and gene arrays because of the...
Eric G. Stephan, Kyle R. Klicker, Mudita Singhal, ...
ENC
2005
IEEE
14 years 4 months ago
Hard Problem Generation for MKP
We developed generators that produce challenging MKP instances. Our approaches uses independently exponential distributions over a wide range to generate the constraint coefficien...
Maria A. Osorio, Germn Cuaya
HICSS
2005
IEEE
159views Biometrics» more  HICSS 2005»
14 years 4 months ago
A Repeatable Collaboration Process for Usability Testing
Evaluating the usability of an application is a crucial activity in systems development projects. It is often done collaboratively, involving groups of current or future users, us...
Gert-Jan de Vreede, Ann L. Fruhling, Anita Chakrap...
« Prev « First page 1645 / 1731 Last » Next »