Learn More
— The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc(More)
— The performance of distributed networks depends on collaboration among distributed entities. To enhance security in distributed networks, such as ad hoc networks, it is important to evaluate the trustworthiness of participating entities since trust is the major driving force for collaboration. In this paper, we present a framework to quantitatively(More)
  • Satoko Hakeda-Suzuki, Julian Ng, Julia Tzu, Georg Dietzl, Yan Sun, Matthew Harms +3 others
  • 2002
Rac GTPases regulate the actin cytoskeleton to control changes in cell shape. To date, the analysis of Rac function during development has relied heavily on the use of dominant mutant isoforms. Here, we use loss-of-function mutations to show that the three Drosophila Rac genes, Rac1, Rac2 and Mtl, have overlapping functions in the control of epithelial(More)
The paper examines the tradeoffs between using a full ac model versus the less exact, but much faster, dc power flow model for LMP-based market calculations. The paper first provides a general discussion of the approximations associated with using a dc model, with an emphasis on the impact these approximations will have on security constrained OPF (SCOPF)(More)
Recent advances in high-throughput RNA sequencing (RNA-seq) have enabled tremendous leaps forward in our understanding of bacterial transcriptomes. However, computational methods for analysis of bacterial transcriptome data have not kept pace with the large and growing data sets generated by RNA-seq technology. Here, we present new algorithms, specific to(More)
Reputation systems are playing critical roles in securing today's distributed computing and communication systems. Similar to other security mechanisms, reputation systems can be under attack. In this paper, we report the discovery of a new attack, named RepTrap(Reputation Trap), against feedback-based reputation systems, such as those used in P2P(More)
  • Bassem A. Hassan, Nessan A. Bermingham, Yuchun He, Yan Sun, Yuh-Nung Jan, Huda Y. Zoghbi +1 other
  • 2000
Drosophila atonal (ato) is the proneural gene of the chordotonal organs (CHOs) in the peripheral nervous system (PNS) and the larval and adult photoreceptor organs. Here, we show that ato is expressed at multiple stages during the development of a lineage of central brain neurons that innervate the optic lobes and are required for eclosion. A novel fate(More)
— In this paper, we propose a time-efficient contributory key agreement framework for secure communications in dynamic groups. The proposed scheme employs a special join-tree/exit-tree topology in the logical key tree and effectively exploits the efficiency of amortized operations. We derive the optimal parameters and design an activation algorithm for the(More)
BACKGROUND The microbiota of an animal's intestinal tract plays important roles in the animal's overall health, productivity and well-being. There is still a scarcity of information on the microbial diversity in the gut of livestock species such as cattle. The primary reason for this lack of data relates to the expense of methods needed to generate such(More)
Secure multicast applications require key management that provides access control. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating. A communication-efficient class of key management schemes is those(More)