Sciweavers

75 search results - page 9 / 15
» Verisim: Formal analysis of network simulations
Sort
View
ICNP
2007
IEEE
14 years 2 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
WDAG
2009
Springer
114views Algorithms» more  WDAG 2009»
14 years 3 months ago
Virtual Ring Routing Trends
Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from dis...
Dahlia Malkhi, Siddhartha Sen, Kunal Talwar, Renat...
TNN
1998
125views more  TNN 1998»
13 years 8 months ago
Symbolic connectionism in natural language disambiguation
Abstract—Natural language understanding involves the simultaneous consideration of a large number of different sources of information. Traditional methods employed in language an...
Samuel W. K. Chan, James Franklin
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 2 months ago
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory
— A formal methodology for the analysis of a closed loop clock distribution and active deskewing network is proposed. In this paper an active clock distribution and deskewing net...
Vinil Varghese, Tom Chen, Peter Michael Young
BMCBI
2008
138views more  BMCBI 2008»
13 years 8 months ago
M-BISON: Microarray-based integration of data sources using networks
Background: The accurate detection of differentially expressed (DE) genes has become a central task in microarray analysis. Unfortunately, the noise level and experimental variabi...
Bernie J. Daigle Jr., Russ B. Altman