Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Background: During the past decades, research and development in drug discovery have attracted much attention and efforts. However, only 324 drug targets are known for clinical dr...
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Abstract. Recent works in XML change detection have focused on detecting changes to ordered or unordered XML documents. However, in real life XML documents may not always be purely...
Erwin Leonardi, Sri L. Budiman, Sourav S. Bhowmick