Sciweavers

520 search results - page 45 / 104
» Computing recombination networks from binary sequences
Sort
View
WISEC
2009
ACM
15 years 4 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
IJCNN
2008
IEEE
15 years 4 months ago
Spatiotemporal feature extraction based on invariance representation
— This paper investigates spatiotemporal feature extraction from temporal image sequences based on invariance representation. Invariance representation is one of important functi...
Wenlu Yang, Liqing Zhang
PKDD
2005
Springer
164views Data Mining» more  PKDD 2005»
15 years 3 months ago
Clustering and Prediction of Mobile User Routes from Cellular Data
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
Kari Laasonen
IWIA
2003
IEEE
15 years 3 months ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
BMCBI
2005
132views more  BMCBI 2005»
14 years 9 months ago
Correlation and prediction of gene expression level from amino acid and dipeptide composition of its protein
Background: A large number of papers have been published on analysis of microarray data with particular emphasis on normalization of data, detection of differentially expressed ge...
Gajendra P. S. Raghava, Joon H. Han