Sciweavers

1001 search results - page 176 / 201
» A Recovery Algorithm for Reliable Multicasting in Reliable N...
Sort
View
SPAA
2010
ACM
14 years 16 days ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
BMCBI
2008
123views more  BMCBI 2008»
13 years 7 months ago
Functional module detection by functional flow pattern mining in protein interaction networks
eraction networks. In this abstract, we extend this approach by mining functional flow patterns for the purpose of detecting small-sized modules for specific functions. Methods Our...
Young-Rae Cho, Lei Shi, Aidong Zhang
ICC
2007
IEEE
171views Communications» more  ICC 2007»
14 years 2 months ago
Progressive Route Calculation Protocol for Wireless Mesh Networks
—Although network-wide flooding in reactive routing protocols like AODV [1] facilitates the discovery of optimal routes, they engender large control overhead. Some efficient floo...
Xuhui Hu, Myung J. Lee, Tarek N. Saadawi
BMCBI
2004
146views more  BMCBI 2004»
13 years 7 months ago
Defining transcriptional networks through integrative modeling of mRNA expression and transcription factor binding data
Background: Functional genomics studies are yielding information about regulatory processes in the cell at an unprecedented scale. In the yeast S. cerevisiae, DNA microarrays have...
Feng Gao, Barrett C. Foat, Harmen J. Bussemaker
MBEC
2011
117views more  MBEC 2011»
12 years 10 months ago
Face activated neurodynamic cortical networks
Previous neuroimaging studies have shown that complex visual stimuli, such as faces, activate multiple brain regions, yet little is known on the dynamics and complexity of the acti...
Ana Susac, Risto J. Ilmoniemi, Douglas Ranken, Sel...