Sciweavers

1422 search results - page 42 / 285
» Design, Implementation and Performance Evaluation of IP-VPN
Sort
View
BMCBI
2004
133views more  BMCBI 2004»
14 years 11 months ago
Evaluation of several lightweight stochastic context-free grammars for RNA secondary structure prediction
Background: RNA secondary structure prediction methods based on probabilistic modeling can be developed using stochastic context-free grammars (SCFGs). Such methods can readily co...
Robin D. Dowell, Sean R. Eddy
TMC
2010
386views more  TMC 2010»
14 years 9 months ago
Design, Realization, and Evaluation of xShare for Impromptu Sharing of Mobile Phones
—Mobile phones are truly personal devices loaded with personal data such as photos, contacts, and call history. Yet it is often necessary or desirable to share our phones with ot...
Yunxin Liu, Ahmad Rahmati, Hyukjae Jang, Yuanhe Hu...
ICDCSW
2011
IEEE
13 years 10 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
DAC
2005
ACM
15 years 1 months ago
Asynchronous circuits transient faults sensitivity evaluation
1 This paper presents a transient faults sensitivity evaluation for Quasi Delay Insensitive (QDI) asynchronous circuits. Because of their specific architecture, asynchronous circui...
Yannick Monnet, Marc Renaudin, Régis Leveug...
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
15 years 4 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu