Sciweavers

1039 search results - page 167 / 208
» Methods as knowledge enablers in software development organi...
Sort
View
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 3 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
ALGOSENSORS
2010
Springer
14 years 8 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
BMCBI
2010
138views more  BMCBI 2010»
14 years 9 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
BMCBI
2011
14 years 4 months ago
Support vector machines-based identification of alternative splicing in Arabidopsis thaliana from whole-genome tiling arrays
Background: Alternative splicing (AS) is a process which generates several distinct mRNA isoforms from the same gene by splicing different portions out of the precursor transcript...
Johannes Eichner, Georg Zeller, Sascha Laubinger, ...
ESEC
1997
Springer
15 years 1 months ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine