Sciweavers

1331 search results - page 157 / 267
» Trust Establishment in Distributed Networks: Analysis and Mo...
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
SECON
2010
IEEE
14 years 7 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang
BMCBI
2007
163views more  BMCBI 2007»
14 years 10 months ago
Use of genomic DNA control features and predicted operon structure in microarray data analysis: ArrayLeaRNA - a Bayesian approac
Background: Microarrays are widely used for the study of gene expression; however deciding on whether observed differences in expression are significant remains a challenge. Resul...
Carmen Pin, Mark Reuter
VTC
2010
IEEE
128views Communications» more  VTC 2010»
14 years 8 months ago
Performance of Underwater Ad-Hoc Networks
Abstract— We consider the performance of underwater acoustic ad-hoc networks. We assume a uniform distribution of the nodes over a finite area. The node-to-node channel is model...
Andrej Stefanov, Milica Stojanovic
CISS
2008
IEEE
14 years 10 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett