Sciweavers

20 search results - page 4 / 4
» Towards practical feasibility of core computation in data ex...
Sort
View
IEEEARES
2009
IEEE
14 years 8 days ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
POLICY
2005
Springer
13 years 11 months ago
Enhancing Web Privacy Protection through Declarative Policies
The Platform for Privacy Preferences (P3P) is a W3C framework for web privacy management. It provides a standard vocabulary that websites can use to describe their privacy practic...
Pranam Kolari, Li Ding, Shashidhara Ganjugunte, An...
VLDB
2008
ACM
170views Database» more  VLDB 2008»
14 years 5 months ago
A multi-ranker model for adaptive XML searching
The evolution of computing technology suggests that it has become more feasible to offer access to Web information in a ubiquitous way, through various kinds of interaction device...
Ho Lam Lau, Wilfred Ng
BMCBI
2008
107views more  BMCBI 2008»
13 years 5 months ago
Extended Newick: it is time for a standard representation of phylogenetic networks
Background: Phylogenetic trees resulting from molecular phylogenetic analysis are available in Newick format from specialized databases but when it comes to phylogenetic networks,...
Gabriel Cardona, Francesc Rosselló, Gabriel...
MOBICOM
2003
ACM
13 years 10 months ago
Topology control for wireless sensor networks
We consider a two-tiered Wireless Sensor Network (WSN) consisting of sensor clusters deployed around strategic locations and base-stations (BSs) whose locations are relatively fl...
Jianping Pan, Yiwei Thomas Hou, Lin Cai, Yi Shi, S...