Sciweavers

2413 search results - page 212 / 483
» Understanding the problem
Sort
View
IJSN
2006
124views more  IJSN 2006»
15 years 4 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
JSS
2008
93views more  JSS 2008»
15 years 4 months ago
Search-based refactoring for software maintenance
The high cost of software maintenance could be reduced by automatically improving the design of object-oriented programs without altering their behaviour. We have constructed a so...
Mark Kent O'Keeffe, Mel Ó Cinnéide
ENTCS
2007
81views more  ENTCS 2007»
15 years 4 months ago
Self-assembling Trees
RCCS is a variant of Milner’s CCS where processes are allowed a controlled form of backtracking. It turns out that the RCCS reinterpretation of a CCS process is equivalent, in t...
Vincent Danos, Jean Krivine, Fabien Tarissan
MONET
2006
173views more  MONET 2006»
15 years 4 months ago
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
We analyze an architecture based on mobility to address the problem of energy efficient data collection in a sensor network. Our approach exploits mobile nodes present in the senso...
Sushant Jain, Rahul Shah, Waylon Brunette, Gaetano...
IJBRA
2007
89views more  IJBRA 2007»
15 years 4 months ago
Conservative adjustment of permutation p-values when the number of permutations is limited
The permutation procedure is widely used to assess the significance level (p-value) of a test statistic. This approach is asymptotically consistent. In genomics and proteomics st...
Yinglei Lai