Sciweavers

3370 search results - page 519 / 674
» Adding Networks
Sort
View
135
Voted
POLICY
2007
Springer
15 years 11 months ago
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel,...
185
Voted
CIS
2004
Springer
15 years 10 months ago
Representation of the Signal Transduction with Aberrance Using Ipi Calculus
The pi calculus has been applied to modelling biochemical networks. In these applications, the modelling is done without considerations to exceptions. The Ipi calculus, the Interfe...
Min Zhang, Guoqiang Li, Yuxi Fu, Zhizhou Zhang, Li...
148
Voted
WIMOB
2007
IEEE
15 years 11 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...
IJCNN
2006
IEEE
15 years 11 months ago
C2FS: An Algorithm for Feature Selection in Cascade Neural Networks
Wrapper-based feature selection is attractive because wrapper methods are able to optimize the features they select to the specific learning algorithm. Unfortunately, wrapper met...
Lars Backstrom, Rich Caruana
RTAS
2003
IEEE
15 years 10 months ago
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network
This paper presents a novel approach for calculating a probabilistic worst-case response-time for messages in the Controller Area Network (CAN). CAN uses a bit-stuffing mechanism...
Thomas Nolte, Hans Hansson, Christer Norström