Sciweavers

54 search results - page 11 / 11
» A Comparison of Hashing Schemes for Address Lookup in Comput...
Sort
View
172
Voted
WS
2004
ACM
15 years 10 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
ISPA
2005
Springer
15 years 10 months ago
Percentage Coverage Configuration in Wireless Sensor Networks
Abstract. Recent researches on energy efficient coverage configuration in wireless sensor networks mainly address the goal of 100% or near 100% coverage preserving. However, we fin...
Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
NETGAMES
2006
ACM
15 years 11 months ago
Post-game estimation of game client RTT and hop count distributions
In first person shooter (FPS) games the round trip time (RTT) (delay, or ‘lag’) between a client and server is an important criterion for players when deciding which server to ...
Grenville J. Armitage, Carl Javier, Sebastian Zand...
144
Voted
BMCBI
2007
114views more  BMCBI 2007»
15 years 5 months ago
Large scale statistical inference of signaling pathways from RNAi and microarray data
Background: The advent of RNA interference techniques enables the selective silencing of biologically interesting genes in an efficient way. In combination with DNA microarray tec...
Holger Fröhlich, Mark Fellmann, Holger Sü...