Sciweavers

1596 search results - page 158 / 320
» Using knowledge nodes for knowledge discovery and collaborat...
Sort
View
ICASSP
2010
IEEE
14 years 10 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
IPPS
2006
IEEE
15 years 4 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
76
Voted
BMCBI
2007
107views more  BMCBI 2007»
14 years 10 months ago
Prediction of potential drug targets based on simple sequence properties
Background: During the past decades, research and development in drug discovery have attracted much attention and efforts. However, only 324 drug targets are known for clinical dr...
Qingliang Li, Luhua Lai
91
Voted
VIZSEC
2007
Springer
15 years 4 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
DEXA
2005
Springer
123views Database» more  DEXA 2005»
15 years 3 months ago
Detecting Changes to Hybrid XML Documents Using Relational Databases
Abstract. Recent works in XML change detection have focused on detecting changes to ordered or unordered XML documents. However, in real life XML documents may not always be purely...
Erwin Leonardi, Sri L. Budiman, Sourav S. Bhowmick