Sciweavers

105 search results - page 16 / 21
» A Tutorial on Decomposition Methods for Network Utility Maxi...
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...
GLOBECOM
2006
IEEE
14 years 1 months ago
Hierarchical Iterative Algorithm for a Coupled Constrained OSNR Nash Game
— This paper develops a hierarchical iterative OSNR algorithm based on a game theory framework. A Nash game is formulated between channels with channel utility related to maximiz...
Lacra Pavel
BMCBI
2006
205views more  BMCBI 2006»
13 years 7 months ago
Application of Petri net based analysis techniques to signal transduction pathways
Background: Signal transduction pathways are usually modelled using classical quantitative methods, which are based on ordinary differential equations (ODEs). However, some diffic...
Andrea Sackmann, Monika Heiner, Ina Koch
INFOCOM
2006
IEEE
14 years 1 months ago
Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions
— We address the problem of energy efficient sensing by adaptively coordinating the sleep schedules of sensor nodes while guaranteeing that values of sleeping nodes can be recov...
Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak
BMCBI
2008
100views more  BMCBI 2008»
13 years 7 months ago
Extracting unrecognized gene relationships from the biomedical literature via matrix factorizations
Background: The construction of literature-based networks of gene-gene interactions is one of the most important applications of text mining in bioinformatics. Extracting potentia...
Hyunsoo Kim, Haesun Park, Barry L. Drake