Sciweavers

1080 search results - page 120 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ACSW
2006
14 years 11 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
JSAC
2008
165views more  JSAC 2008»
14 years 9 months ago
Energy-Efficient Routing Schemes for Underwater Acoustic Networks
Interest in underwater acoustic networks has grown rapidly with the desire to monitor the large portion of the world covered by oceans. Fundamental differences between underwater a...
Michele Zorzi, Paolo Casari, Nicola Baldo, Albert ...
BMCBI
2010
147views more  BMCBI 2010»
14 years 10 months ago
CNstream: A method for the identification and genotyping of copy number polymorphisms using Illumina microarrays
Background: Understanding the genetic basis of disease risk in depth requires an exhaustive knowledge of the types of genetic variation. Very recently, Copy Number Variants (CNVs)...
Arnald Alonso, Antonio Julià, Raül Tor...
BMCBI
2005
169views more  BMCBI 2005»
14 years 9 months ago
Genetic interaction motif finding by expectation maximization - a novel statistical model for inferring gene modules from synthe
Background: Synthetic lethality experiments identify pairs of genes with complementary function. More direct functional associations (for example greater probability of membership...
Yan Qi 0003, Ping Ye, Joel S. Bader
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 4 months ago
On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks with Relays Deployment
—In this paper, a binary hypothesis distributed detection problem in correlated wireless sensor networks with cooperative relays deployment is considered. In particular, the effe...
Mohammed W. Baidas, Ahmed S. Ibrahim, Karim G. Sed...