Sciweavers

7434 search results - page 184 / 1487
» Still
Sort
View
IWPC
2009
IEEE
15 years 11 months ago
Intensions are a key to program comprehension
The classical comprehension theories study relations between extensions, intensions, and names. Originally developed in linguistics and mathematics, these theories are applicable ...
Václav Rajlich
ACNS
2009
Springer
170views Cryptology» more  ACNS 2009»
15 years 11 months ago
Fragility of the Robust Security Network: 802.11 Denial of Service
The upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two oth...
Martin Eian
ADHOCNETS
2009
Springer
15 years 11 months ago
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
David Peters, Reinhardt Karnapke, Jörg Nolte
WABI
2009
Springer
156views Bioinformatics» more  WABI 2009»
15 years 11 months ago
Phylogenetic Comparative Assembly
Recent high throughput sequencing technologies are capable of generating a huge amount of data for bacterial genome sequencing projects. Although current sequence assemblers succes...
Peter Husemann, Jens Stoye
141
Voted
WEBI
2009
Springer
15 years 11 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li