In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Using OTS (Off-The-Shelf) components in software development has become increasingly popular in the IT industry. OTS components can be either COTS (Commercial-Off-The-Shelf), or O...
Jingyue Li, Reidar Conradi, Odd Petter N. Slyngsta...
Instant wireless sensor network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and t...
Yi-Ying Zhang, Xi Luo, Laurence Tianruo Yang, Lei ...
Small-form-factor, low-power wireless sensors—motes—are convenient to deploy, but lack the bandwidth to capture and transmit raw high-frequency data, such as human voices or n...
Ben Greenstein, Christopher Mar, Alex Pesterev, Sh...
Background: The amount of data on protein-protein interactions (PPIs) available in public databases and in the literature has rapidly expanded in recent years. PPI data can provid...