Sciweavers

644 search results - page 117 / 129
» A topological characterization of weakness
Sort
View
LCN
2006
IEEE
15 years 3 months ago
Clustered Mobility Model for Scale-Free Wireless Networks
— Recently, researchers have discovered that many of social, natural and biological networks are characterized by scale-free power-law connectivity distribution and a few densely...
Sunho Lim, Chansu Yu, Chita R. Das
CSB
2003
IEEE
15 years 2 months ago
An SVM-based Algorithm for Identification of Photosynthesis-specific Genome Features
This paper presents a novel algorithm for identification and functional characterization of “key” genome features responsible for a particular biochemical process of interest....
Gong-Xin Yu, George Ostrouchov, Al Geist, Nagiza F...
INFOCOM
2003
IEEE
15 years 2 months ago
Uplink Scheduling in CDMA Packet-Data Systems
Abstract—Uplink scheduling in wireless systems is gaining importance due to arising uplink intensive data services (ftp, image uploads etc.), which could be hampered by the curre...
Krishnan Kumaran, Lijun Qian
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
15 years 1 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil