Sciweavers

12493 search results - page 2439 / 2499
» Information Access in the Web
Sort
View
ACSAC
2007
IEEE
15 years 7 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
ACSAC
2007
IEEE
15 years 7 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
COMSWARE
2007
IEEE
15 years 7 months ago
On Optimal Performance in Mobile Ad hoc Networks
In this paper we are concerned with finding the maximum throughput that a mobile ad hoc network can support. Even when nodes are stationary, the problem of determining the capaci...
Tapas K. Patra, Joy Kuri, Pavan Nuggehalli
ICASSP
2007
IEEE
15 years 7 months ago
Protein Fold Recognition using Residue-Based Alignments of Sequence and Secondary Structure
Protein structure prediction aims to determine the three-dimensional structure of proteins form their amino acid sequences. When a protein does not have similarity (homology) to a...
Zafer Aydin, Hakan Erdogan, Yucel Altunbasak
ICC
2007
IEEE
185views Communications» more  ICC 2007»
15 years 7 months ago
Maximal Lifetime Rate and Power Allocation for Sensor Networks with Data Distortion Constraints
— We address a lifetime maximization problem for a single-hop wireless sensor network where multiple sensors encode and communicate their measurements of a Gaussian random source...
James C. F. Li, Subhrakanti Dey, Jamie S. Evans
« Prev « First page 2439 / 2499 Last » Next »