Sciweavers

9316 search results - page 1725 / 1864
» Analysis of traceback techniques
Sort
View
SCN
2008
Springer
147views Communications» more  SCN 2008»
15 years 4 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
SIGMETRICS
2008
ACM
128views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluation
Local network coding is growing in prominence as a technique to facilitate greater capacity utilization in multi-hop wireless networks. A specific objective of such local network ...
Shravan K. Rayanchu, Sayandeep Sen, Jianming Wu, S...
TCS
2008
15 years 4 months ago
Algorithms for computing variants of the longest common subsequence problem
The longest common subsequence(LCS) problem is one of the classical and wellstudied problems in computer science. The computation of the LCS is a frequent task in DNA sequence ana...
Costas S. Iliopoulos, M. Sohel Rahman
TISSEC
2008
235views more  TISSEC 2008»
15 years 4 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
BMCBI
2005
122views more  BMCBI 2005»
15 years 4 months ago
Computational verification of protein-protein interactions by orthologous co-expression
Background: High-throughput methods identify an overwhelming number of protein-protein interactions. However, the limited accuracy of these methods results in the false identifica...
Itay Tirosh, Naama Barkai
« Prev « First page 1725 / 1864 Last » Next »