Sciweavers

1188 search results - page 200 / 238
» States of Knowledge
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
14 years 10 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CORR
2008
Springer
131views Education» more  CORR 2008»
14 years 10 months ago
Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I: Fast Fading Channels
This is the first part of a two-part paper that studies the problem of jamming in a fixed-rate transmission system with fading, under the general assumption that the jammer has no...
George T. Amariucai, Shuangqing Wei
BMCBI
2006
111views more  BMCBI 2006»
14 years 10 months ago
SIMMAP: Stochastic character mapping of discrete traits on phylogenies
Background: Character mapping on phylogenies has played an important, if not critical role, in our understanding of molecular, morphological, and behavioral evolution. Until very ...
Jonathan P. Bollback
BMCBI
2006
119views more  BMCBI 2006»
14 years 10 months ago
A methodology for the structural and functional analysis of signaling and regulatory networks
Background: Structural analysis of cellular interaction networks contributes to a deeper understanding of network-wide interdependencies, causal relationships, and basic functiona...
Steffen Klamt, Julio Saez-Rodriguez, Jonathan A. L...
BMCBI
2006
119views more  BMCBI 2006»
14 years 10 months ago
Hidden Markov Model Variants and their Application
Markov statistical methods may make it possible to develop an unsupervised learning process that can automatically identify genomic structure in prokaryotes in a comprehensive way...
Stephen Winters-Hilt