Sciweavers

783 search results - page 86 / 157
» Visual analysis of network centralities
Sort
View
SENSYS
2005
ACM
14 years 3 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
MSWIM
2003
ACM
14 years 3 months ago
Simulation of large ad hoc networks
An ad hoc network is formed by wireless mobile nodes (hosts) that operate as terminals as well as routers in the network, without any centralized administration. Research in ad ho...
Valeriy Naoumov, Thomas R. Gross
JNW
2008
116views more  JNW 2008»
13 years 8 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
SDM
2007
SIAM
109views Data Mining» more  SDM 2007»
13 years 11 months ago
Segmentations with Rearrangements
Sequence segmentation is a central problem in the analysis of sequential and time-series data. In this paper we introduce and we study a novel variation to the segmentation proble...
Aristides Gionis, Evimaria Terzi
BMCBI
2006
120views more  BMCBI 2006»
13 years 10 months ago
SCOWLP: a web-based database for detailed characterization and visualization of protein interfaces
Background: Currently there is a strong need for methods that help to obtain an accurate description of protein interfaces in order to be able to understand the principles that go...
Joan Teyra, Andreas Doms, Michael Schroeder, M. Te...