Sciweavers

1513 search results - page 241 / 303
» Fibonacci Correction Networks
Sort
View
ICCS
2007
Springer
15 years 9 months ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
DSN
2004
IEEE
15 years 9 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
DIMVA
2010
15 years 6 months ago
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
Abstract. Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Alt...
Antonio Nappa, Aristide Fattori, Marco Balduzzi, M...
MMNS
2001
151views Multimedia» more  MMNS 2001»
15 years 6 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
BMCBI
2007
130views more  BMCBI 2007»
15 years 5 months ago
A model-based optimization framework for the inference of regulatory interactions using time-course DNA microarray expression da
Background: Proteins are the primary regulatory agents of transcription even though mRNA expression data alone, from systems like DNA microarrays, are widely used. In addition, th...
Reuben Thomas, Carlos J. Paredes, Sanjay Mehrotra,...