Sciweavers

777 search results - page 149 / 156
» presence 2010
Sort
View
TDSC
2010
191views more  TDSC 2010»
14 years 10 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
TMC
2010
137views more  TMC 2010»
14 years 10 months ago
Asymptotic Distortion Performance of Source-Channel Diversity over Multihop and Relay Channels
—A key challenge in the design of real-time wireless multimedia systems is the presence of fading coupled with strict delay constraints. A very effective answer to this problem i...
Karim G. Seddik, Andres Kwasinski, K. J. Ray Liu
116
Voted
TPDS
2010
222views more  TPDS 2010»
14 years 10 months ago
Energy-Efficient Beaconless Geographic Routing in Wireless Sensor Networks
—Geographic routing is an attractive localized routing scheme for wireless sensor networks (WSNs) due to its desirable scalability and efficiency. Maintaining neighborhood inform...
Haibo Zhang, Hong Shen
WABI
2010
Springer
178views Bioinformatics» more  WABI 2010»
14 years 10 months ago
Haplotype Inference on Pedigrees with Recombinations and Mutations
Abstract. Haplotype Inference (HI) is a computational challenge of crucial importance in a range of genetic studies, such as functional genomics, pharmacogenetics and population ge...
Yuri Pirola, Paola Bonizzoni, Tao Jiang
124
Voted
WDAG
2010
Springer
218views Algorithms» more  WDAG 2010»
14 years 10 months ago
Anonymous Asynchronous Systems: The Case of Failure Detectors
Abstract: Due the multiplicity of loci of control, a main issue distributed systems have to cope with lies in the uncertainty on the system state created by the adversaries that ar...
François Bonnet, Michel Raynal