Sciweavers

1822 search results - page 277 / 365
» GENI Design Principles
Sort
View
151
Voted
SASN
2006
ACM
15 years 9 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
134
Voted
SOUPS
2006
ACM
15 years 9 months ago
Aligning usability and security: a usability study of Polaris
Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Alexander J. DeWitt, Jasna Kuljis
101
Voted
CEC
2005
IEEE
15 years 9 months ago
A population-based, steady-state procedure for real-parameter optimization
Despite the existence of a number of procedures for real-parameter optimization using evolutionary algorithms, there is still a need of a systematic and unbiased comparison of di...
Ankur Sinha, Santosh Tiwari, Kalyanmoy Deb
CSB
2005
IEEE
149views Bioinformatics» more  CSB 2005»
15 years 9 months ago
Combinatorial method of splice sites prediction
Predicting and proper ranking of splice sites (SS) is a challenging problem in bioinformatics and machine learning communities. Proposed method of donor and acceptor SSs predictio...
Alexander G. Churbanov, Hesham H. Ali
110
Voted
HICSS
2005
IEEE
138views Biometrics» more  HICSS 2005»
15 years 9 months ago
A Method to Redesign the IS Portfolios in Large Organisations
Over the past decades, large organisations have developed increasingly complex portfolios of information systems to support business processes. Maintenance and leveraging of these...
Remco Groot, Martin Smits, Halbe Kuipers