Sciweavers

7544 search results - page 1273 / 1509
» Network Forensics Analysis
Sort
View
PERCOM
2010
ACM
15 years 3 months ago
Profiling sprints using on-body sensors
This paper describes the design, implementation and deployment of a wireless sensor system for athletes. The system is designed to profile sprints based on input from on-body senso...
Salman Taherian, Marcelo Pias, Robert Harle, Georg...
RAID
2010
Springer
15 years 3 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
TRIDENTCOM
2010
IEEE
15 years 3 months ago
TopHat: Supporting Experiments through Measurement Infrastructure Federation
Researchers use the PlanetLab testbed for its ability to host experimental applications in realistic conditions over the public besteffort internet. Such applications form overlays...
Thomas Bourgeau, Jordan Augé, Timur Friedma...
ICUMT
2009
15 years 3 months ago
Application of smoothed estimators in spectrum sensing technique based on model selection
In cognitive radio networks, secondary user (SU) does not have rights to transmit when the primary user (PU) band is occupied, that's why a sensing technique must be done. Rec...
Bassem Zayen, Aawatif Hayar, Hamza Debbabi, Hichem...
BIBM
2010
IEEE
173views Bioinformatics» more  BIBM 2010»
15 years 2 months ago
Network-based identification of smoking-associated gene signature for lung cancer
This study presents a novel computational approach to identifying a smoking-associated gene signature. The methodology contains the following steps: 1) identifying genes significa...
Ying-Wooi Wan, Changchang Xiao, Nancy Lan Guo
« Prev « First page 1273 / 1509 Last » Next »