نتایج جستجو برای: node capture

تعداد نتایج: 287175  

2014
L. V. Mancini A. Mei J. - P. Kaps B. Sunar S. Shenker

A new set of security challenges arises in sensor networks due to the fact that current sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments where they are vulnerable to capture and compromise by an adversary. A serious consequence of node compromise is that once an adversary has obtained the credentials of a sensor node, it can surreptitious...

Journal: :Knowl.-Based Syst. 2016
Norman E. Fenton Martin Neil David A. Lagnado William Marsh Barbaros Yet Anthony C. Constantinou

We show that existing Bayesian network (BN) modelling techniques cannot capture the correct intuitive reasoning in the important case when a set of mutually exclusive events need to be modelled as separate nodes instead of states of a single node. A previously proposed ‘solution’, which introduces a simple constraint node that enforces mutual exclusivity, fails to preserve the prior probabiliti...

2005
Asad Amir Pirzada Chris McDonald

Sensor networks are formed with the help of a large number of wireless nodes, generally with limited energy, computation and transmission powers. Each node helps every other node in the network by forwarding their packets. All is well if such an altruistic attitude is upheld by all participating nodes. However, as these nodes often operate in a physically insecure environment, they are vulnerab...

Journal: :Wireless Personal Communications 2005
Tatiana K. Madsen Frank H. P. Fitzek Ramjee Prasad Gerrit Schulte

The paper presents a new approach investigating mobile ad hoc network connectivity. It is shown how to define and evaluate the connectivity probability of a mobile network where the position of the nodes and the link quality changes over time. The connectivity probability is a measure that can capture the impact of the node movement on the network connectivity. A number of mobility models is co...

Journal: :Cancer research 2002
Suguru Hasegawa Yoichi Furukawa Meihua Li Seiji Satoh Tatsushi Kato Takeshi Watanabe Toyomasa Katagiri Tatsuhiko Tsunoda Yoshio Yamaoka Yusuke Nakamura

To shed light on mechanisms that underlie development and/or progression of intestinal-type gastric cancer, we compared expression profiles of cancer cells obtained by laser-capture microdissection of 20 intestinal-type gastric tumors with expression of genes in corresponding noncancerous mucosae, by a cDNA microarray consisting of 23,040 genes. We identified 61 genes that were commonly up-regu...

Journal: :middle east journal of cancer 0
sedigheh tahmasebi general surgery department, shiraz university of medical sciences, shiraz, iran mohammad haghighifard general surgery department, shiraz university of medical sciences, shiraz, iran abdolrasoul talei general surgery department, shiraz university of medical sciences, shiraz, iran

background : sentinel lymph node biopsy is a technique used to identify the axillary node most likely to contain tumor cells that have metastasized from a primary carcinoma of the breast. this technique provides accurate staging with fewer complications than axillary dissection and may result in decreased costs. we designed the present study to determine the accuracy and success rate of a combi...

2015
M. Ali B. G. Stewart A. Shahrabi A. Vallavaraj S. Mueller R. P. Tsang Maria Carla Calzarossa S. P. Terdal V. D. Mytri A. Damodaram

Routing is a challenging task in Mobile Ad hoc Networks (MANET) due to their dynamic topology and lack of central administration. As a consequence of un-predictable topology changes of such networks, routing protocols employed need to accurately capture the delay, load, available bandwidth and residual node energy at various locations of the network for effective energy and load balancing. This...

Journal: :CoRR 2014
Gunes Ercal

We have previously introduced vertex attack tolerance (VAT), denoted mathematically as τ(G) = minS⊂V |S| |V−S−Cmax(V−S)|+1 where Cmax(V −S) is the largest connected component in V − S, as an appropriate mathematical measure of resilience in the face of targeted node attacks for arbitrary degree networks. A part of the motivation for VAT was the observation that, whereas conductance, Φ(G), captu...

2015
Henrike Niederholtmeyer Zachary Z Sun Yutaka Hori Enoch Yeung Amanda Verpoorte Richard M Murray Sebastian J Maerkl Friedrich Simmel

While complex dynamic biological networks control gene expression in all living organisms, the forward engineering of comparable synthetic networks remains challenging. The current paradigm of characterizing synthetic networks in cells results in lengthy design-build-test cycles, minimal data collection, and poor quantitative characterization. Cell-free systems are appealing alternative environ...

2017
Yun Zhang Kehui Chen Allan Sampson Kai Hwang Beatriz Luna

Stochastic block model (SBM) and its variants are popular models used in community detection for network data. In this paper, we propose a feature adjusted stochastic block model (FASBM) to capture the impact of node features on the network links as well as to detect the residual community structure beyond that explained by the node features. The proposed model can accommodate multiple node fea...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید