Sciweavers

2507 search results - page 406 / 502
» Wireless Network Information Flow
Sort
View
BMCBI
2005
124views more  BMCBI 2005»
13 years 8 months ago
Tools enabling the elucidation of molecular pathways active in human disease: Application to Hepatitis C virus infection
Background: The extraction of biological knowledge from genome-scale data sets requires its analysis in the context of additional biological information. The importance of integra...
David J. Reiss, Iliana Avila-Campillo, Vesteinn Th...
PERCOM
2009
ACM
14 years 8 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
BSN
2009
IEEE
160views Sensor Networks» more  BSN 2009»
14 years 2 months ago
BSN Simulator: Optimizing Application Using System Level Simulation
—A biomonitoring application running on wireless BAN has stringent timing and energy requirements. Developing such applications therefore presents unique challenges in both hardw...
Ioana Cutcutache, Thi Thanh Nga Dang, Wai Kay Leon...
IPPS
2007
IEEE
14 years 2 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ICDE
2006
IEEE
142views Database» more  ICDE 2006»
14 years 2 months ago
Location-based Spatial Queries with Data Sharing in Mobile Environments
Mobile clients feature increasingly sophisticated wireless networking support that enables realtime information exchange with remote databases. Location-dependent queries, such as...
Wei-Shinn Ku, Roger Zimmermann