Sciweavers

132 search results - page 24 / 27
» A method for access authorisation through delegation network...
Sort
View
DAM
2006
132views more  DAM 2006»
13 years 7 months ago
On the combinatorial structure of chromatic scheduling polytopes
Chromatic scheduling polytopes arise as solution sets of the bandwidth allocation problem in certain radio access networks, supplyingwirelessaccesstovoice/datacommunicationnetwork...
Javier Marenco, Annegret Wagler
JSAC
2007
139views more  JSAC 2007»
13 years 7 months ago
Reverse-Engineering MAC: A Non-Cooperative Game Model
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang,...
BMCBI
2006
190views more  BMCBI 2006»
13 years 7 months ago
SNPs3D: Candidate gene and SNP selection for association studies
Background: The relationship between disease susceptibility and genetic variation is complex, and many different types of data are relevant. We describe a web resource and databas...
Peng Yue, Eugene Melamud, John Moult
BMCBI
2008
116views more  BMCBI 2008»
13 years 7 months ago
The combination approach of SVM and ECOC for powerful identification and classification of transcription factor
Background: Transcription factors (TFs) are core functional proteins which play important roles in gene expression control, and they are key factors for gene regulation network co...
Guangyong Zheng, Ziliang Qian, Qing Yang, Chaochun...
SIGMOD
2010
ACM
232views Database» more  SIGMOD 2010»
13 years 7 months ago
Optimizing content freshness of relations extracted from the web using keyword search
An increasing number of applications operate on data obtained from the Web. These applications typically maintain local copies of the web data to avoid network latency in data acc...
Mohan Yang, Haixun Wang, Lipyeow Lim, Min Wang