Sciweavers

2503 search results - page 390 / 501
» Building Computer Network Attacks
Sort
View
WWW
2008
ACM
16 years 2 months ago
Networked graphs: a declarative mechanism for SPARQL rules, SPARQL views and RDF data integration on the web
Easy reuse and integration of declaratively described information in a distributed setting is one of the main motivations for building the Semantic Web. Despite of this claim, reu...
Simon Schenk, Steffen Staab
MOBISYS
2004
ACM
16 years 1 months ago
Energy-Efficient Surveillance System Using Wireless Sensor Networks
The focus of surveillance missions is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve a high element of ri...
Tian He, Sudha Krishnamurthy, John A. Stankovic, T...
SENSYS
2006
ACM
15 years 7 months ago
ATPC: adaptive transmission power control for wireless sensor networks
Extensive empirical studies presented in this paper confirm that the quality of radio communication between low power sensor devices varies significantly with time and environme...
Shan Lin, Jingbin Zhang, Gang Zhou, Lin Gu, John A...
USENIX
2008
15 years 3 months ago
Large-scale Virtualization in the Emulab Network Testbed
Network emulation is valuable largely because of its ability to study applications running on real hosts and "somewhat real" networks. However, conservatively allocating...
Mike Hibler, Robert Ricci, Leigh Stoller, Jonathon...
BMCBI
2006
110views more  BMCBI 2006»
15 years 1 months ago
Modelling the network of cell cycle transcription factors in the yeast Saccharomyces cerevisiae
Background: Reverse-engineering regulatory networks is one of the central challenges for computational biology. Many techniques have been developed to accomplish this by utilizing...
Shawn Cokus, Sherri Rose, David Haynor, Niels Gr&o...