Sciweavers

2863 search results - page 328 / 573
» Constructing minimum-interference networks
Sort
View
144
Voted
BMCBI
2006
181views more  BMCBI 2006»
15 years 4 months ago
Automatic pathway building in biological association networks
Background: Scientific literature is a source of the most reliable and comprehensive knowledge about molecular interaction networks. Formalization of this knowledge is necessary f...
Anton Yuryev, Zufar Mulyukov, Ekaterina Kotelnikov...
CN
2006
79views more  CN 2006»
15 years 4 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
ISF
2008
114views more  ISF 2008»
15 years 4 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
JSAC
2006
167views more  JSAC 2006»
15 years 4 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
CVPR
2004
IEEE
16 years 6 months ago
Learning a Restricted Bayesian Network for Object Detection
Many classes of images have the characteristics of sparse structuring of statistical dependency and the presence of conditional independencies among various groups of variables. S...
Henry Schneiderman