Sciweavers

3486 search results - page 693 / 698
» On the Design and Security of RC2
Sort
View
MOBICOM
2010
ACM
14 years 10 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
78
Voted
ADHOC
2007
109views more  ADHOC 2007»
14 years 10 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
BMCBI
2008
182views more  BMCBI 2008»
14 years 10 months ago
MiMiR - an integrated platform for microarray data sharing, mining and analysis
Background: Despite considerable efforts within the microarray community for standardising data format, content and description, microarray technologies present major challenges i...
Chris Tomlinson, Manjula Thimma, Stelios Alexandra...
77
Voted
BMCBI
2007
112views more  BMCBI 2007»
14 years 10 months ago
Integrated olfactory receptor and microarray gene expression databases
Background: Gene expression patterns of olfactory receptors (ORs) are an important component of the signal encoding mechanism in the olfactory system since they determine the inte...
Nian Liu, Chiquito J. Crasto, Minghong Ma
AHSWN
2006
206views more  AHSWN 2006»
14 years 10 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch