Sciweavers

28357 search results - page 5586 / 5672
» Communications
Sort
View
TKDE
2008
122views more  TKDE 2008»
14 years 9 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
BMCBI
2005
112views more  BMCBI 2005»
14 years 9 months ago
Web services and workflow management for biological resources
Backgorund: The completion of the Human Genome Project has resulted in large quantities of biological data which are proving difficult to manage and integrate effectively. There i...
Paolo Romano 0001, Domenico Marra, Luciano Milanes...
TMC
2008
78views more  TMC 2008»
14 years 9 months ago
SELECT: Self-Learning Collision Avoidance for Wireless Networks
The limited number of orthogonal channels and autonomous installations of hotspots and home wireless networks often leave neighboring 802.11 basic service sets (BSSs) operating on ...
Chun-cheng Chen, Eunsoo Seo, Hwangnam Kim, Haiyun ...
TMC
2008
125views more  TMC 2008»
14 years 9 months ago
Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks
A k-hop dominating set is a subset of nodes such that each node not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can ...
Hong-Yen Yang, Chia-Hung Lin, Ming-Jer Tsai
JCIT
2007
111views more  JCIT 2007»
14 years 9 months ago
Pedagogical Usability Checklist for ESL/EFL E-learning Websites
It is, thus, not surprising that English education has gained more attention than ever and there also has been a growing amount of interest in learning English online. Although the...
C. J. Lim, S. Lee
« Prev « First page 5586 / 5672 Last » Next »