Sciweavers

20638 search results - page 3932 / 4128
» Computer Networks
Sort
View
IJNSEC
2007
137views more  IJNSEC 2007»
15 years 2 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
TCBB
2008
103views more  TCBB 2008»
15 years 2 months ago
DNA Motif Representation with Nucleotide Dependency
The problem of discovering novel motifs of binding sites is important to the understanding of gene regulatory networks. Motifs are generally represented by matrices (PWM or PSSM) o...
Francis Y. L. Chin, Henry C. M. Leung
137
Voted
TCS
2008
15 years 2 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
IS
2007
15 years 2 months ago
Evaluation of probabilistic queries over imprecise data in constantly-evolving environments
Sensors are often employed to monitor continuously changing entities like locations of moving objects and temperature. The sensor readings are reported to a database system, and a...
Reynold Cheng, Dmitri V. Kalashnikov, Sunil Prabha...
TIP
2008
126views more  TIP 2008»
15 years 2 months ago
Maximum-Entropy Expectation-Maximization Algorithm for Image Reconstruction and Sensor Field Estimation
Abstract--In this paper, we propose a maximum-entropy expectation-maximization (MEEM) algorithm. We use the proposed algorithm for density estimation. The maximum-entropy constrain...
Hunsop Hong, Dan Schonfeld
« Prev « First page 3932 / 4128 Last » Next »