Sciweavers

1518 search results - page 208 / 304
» Cryptographic Test Correction
Sort
View
92
Voted
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 7 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
96
Voted
RECONFIG
2009
IEEE
182views VLSI» more  RECONFIG 2009»
15 years 7 months ago
Scalability Studies of the BLASTn Scan and Ungapped Extension Functions
BLASTn is a ubiquitous tool used for large scale DNA analysis. Detailed profiling tests reveal that the most computationally intensive sections of the BLASTn algorithm are the sc...
Siddhartha Datta, Ron Sass
110
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
A Localized Multi-Hop Desynchronization Algorithm for Wireless Sensor Networks
Abstract—This paper presents a new desynchronization algorithm aimed at providing collision-free transmission scheduling for single-hop and acyclic multi-hop wireless sensor netw...
Hui Kang, Jennifer L. Wong
ISDA
2009
IEEE
15 years 7 months ago
A Genetic Programming-Based Algorithm for Composing Web Services
—Web Services are interfaces that describe a collection of operations that are network-accessible through standardized web protocols. When a required operation is not found, seve...
Manuel Mucientes, Manuel Lama, Miguel I. Couto
79
Voted
CAIP
2009
Springer
196views Image Analysis» more  CAIP 2009»
15 years 7 months ago
Modeling and Measurement of 3D Deformation of Scoliotic Spine Using 2D X-ray Images
Scoliosis causes deformations such as twisting and lateral bending of the spine. To correct scoliotic deformation, the extents of 3D spinal deformation need to be measured. This pa...
Hao Li, Wee Kheng Leow, Chao-Hui Huang, Tet Sen Ho...