Sciweavers

31324 search results - page 205 / 6265
» Compare
Sort
View
DBISP2P
2006
Springer
109views Database» more  DBISP2P 2006»
15 years 8 months ago
A Comparative Study of Pub/Sub Methods in Structured P2P Networks
Matthias Bender, Sebastian Michel, Sebastian Parki...
140
Voted
DCOSS
2006
Springer
15 years 8 months ago
The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study
In this paper, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more lan...
Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li...
111
Voted
FDTC
2006
Springer
100views Cryptology» more  FDTC 2006»
15 years 8 months ago
A Comparative Cost/Security Analysis of Fault Attack Countermeasures
Tal Malkin, François-Xavier Standaert, Moti...
GCB
2006
Springer
119views Biometrics» more  GCB 2006»
15 years 8 months ago
Comparative Analysis of Cyclic Sequences: Viroids and other Small Circular RNAs
: The analysis of small circular sequences requires specialized tools. While the differences between linear and circular sequences can be neglected in the case of long molecules su...
Axel Mosig, Ivo L. Hofacker, Peter F. Stadler
142
Voted
GECCO
2006
Springer
156views Optimization» more  GECCO 2006»
15 years 8 months ago
A comparative study of evolutionary optimization techniques in dynamic environments
Genetic Algorithms have widely been used for solving optimization problems in stationary environments. In recent years, there has been a growing interest for investigating and imp...
Demet Ayvaz, Haluk Topcuoglu, Fikret S. Gürge...