Sciweavers

1221 search results - page 237 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
ICALP
2009
Springer
14 years 8 months ago
Maximum Bipartite Flow in Networks with Adaptive Channel Width
Traditionally, combinatorial optimization problems (such as maximum flow, maximum matching, etc.) have been studied for networks where each link has a fixed capacity. Recent resear...
Yossi Azar, Aleksander Madry, Thomas Moscibroda, D...
ENVSOFT
2006
72views more  ENVSOFT 2006»
13 years 8 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
DSN
2005
IEEE
14 years 2 months ago
On Partial Protection in Groomed Optical WDM Mesh Networks
In this paper, we consider the problem of survivable network design in traffic groomed optical WDM mesh networks with sub-wavelength capacity connections. In typical survivable n...
Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krish...
BMCBI
2008
168views more  BMCBI 2008»
13 years 8 months ago
Predicting protein folding pathways at the mesoscopic level based on native interactions between secondary structure elements
Background: Since experimental determination of protein folding pathways remains difficult, computational techniques are often used to simulate protein folding. Most current techn...
Qingwu Yang, Sing-Hoi Sze
JMM2
2007
96views more  JMM2 2007»
13 years 8 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk