Sciweavers

17582 search results - page 3438 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
RAID
2010
Springer
15 years 21 days ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
113
Voted
SUTC
2010
IEEE
15 years 21 days ago
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks
—Compressed Sensing (CS) is a novel sampling paradigm that tries to take data-compression concepts down to the sampling layer of a sensory system. It states that discrete compres...
Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Nee...
IMC
2010
ACM
15 years 7 days ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
ICISS
2009
Springer
15 years 1 days ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....
BMCBI
2010
108views more  BMCBI 2010»
14 years 11 months ago
Prediction of RNA secondary structure by maximizing pseudo-expected accuracy
Background: Recent studies have revealed the importance of considering the entire distribution of possible secondary structures in RNA secondary structure predictions; therefore, ...
Michiaki Hamada, Kengo Sato, Kiyoshi Asai
« Prev « First page 3438 / 3517 Last » Next »