Sciweavers

5132 search results - page 1013 / 1027
» Toward Design as Collaboration
Sort
View
98
Voted
COMCOM
2006
194views more  COMCOM 2006»
14 years 9 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
CORR
2006
Springer
118views Education» more  CORR 2006»
14 years 9 months ago
Integration and mining of malaria molecular, functional and pharmacological data: how far are we from a chemogenomic knowledge s
The organization and mining of malaria genomic and post-genomic data is important to significantly increase the knowledge of the biology of its causative agents, and is motivated,...
L.-M. Birkholtz, Olivier Bastien, G. Wells, D. Gra...
ETT
2006
154views Education» more  ETT 2006»
14 years 9 months ago
Digital switchover in UHF: the ATHENA concept for broadband access
This paper presents a concept adopted by ATHENA IST-507312 project for the proper adoption of digital switchover (DSO), i.e. the transition form analogue to digital broadcasting in...
Evangelos Pallis, Charalambos Mantakas, George Mas...
IJMMS
2008
60views more  IJMMS 2008»
14 years 9 months ago
In praise of forgiveness: Ways for repairing trust breakdowns in one-off online interactions
Online offences are generally considered as frequent and intentional acts performed by a member with the aim to deceive others. However, an offence may also be unintentional or ex...
Asimina Vasalou, Astrid Hopfensitz, Jeremy V. Pitt
CN
2007
133views more  CN 2007»
14 years 9 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
« Prev « First page 1013 / 1027 Last » Next »