Sciweavers

287 search results - page 48 / 58
» Audio authentication based on distributed source coding
Sort
View
COMCOM
2006
194views more  COMCOM 2006»
14 years 9 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
ICSE
2009
IEEE-ACM
15 years 10 months ago
Locating need-to-translate constant strings for software internationalization
Modern software applications require internationalization to be distributed to different regions of the world. In various situations, many software applications are not internatio...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...
SIGMETRICS
2002
ACM
128views Hardware» more  SIGMETRICS 2002»
14 years 9 months ago
High-density model for server allocation and placement
It is well known that optimal server placement is NP-hard. We present an approximate model for the case when both clients and servers are dense, and propose a simple server alloca...
Craig W. Cameron, Steven H. Low, David X. Wei
OSDI
2006
ACM
15 years 10 months ago
Operating System Profiling via Latency Analysis
Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavi...
Nikolai Joukov, Avishay Traeger, Rakesh Iyer, Char...
BIOINFORMATICS
2012
12 years 12 months ago
MolClass: a web portal to interrogate diverse small molecule screen datasets with different computational models
Summary: The MolClass toolkit and data portal generates computational models from user-defined small molecule datasets based on structural features identified in hit and non-hit m...
Jan Wildenhain, Nicholas FitzGerald, Mike Tyers