Sciweavers

35 search results - page 7 / 7
» Analysis of soft handover measurements in 3G network
Sort
View
INFOCOM
2009
IEEE
14 years 5 months ago
An Evaluation of Weak State Mechanism Design for Indirection in Dynamic Networks
—State signaling and maintenance mechanisms play crucial roles in communication network protocols. State is used to facilitate indirections in protocols such as routing. Design a...
Utku Gunay Acer, Alhussein A. Abouzeid, Shivkumar ...
CCS
2001
ACM
14 years 3 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
BMCBI
2010
104views more  BMCBI 2010»
13 years 11 months ago
Analysis of protein-protein docking decoys using interaction fingerprints: application to the reconstruction of CaM-ligand compl
Background: Protein-protein docking for proteins with large conformational changes was analyzed by using interaction fingerprints, one of the scales for measuring similarities amo...
Nobuyuki Uchikoga, Takatsugu Hirokawa
EUSFLAT
2009
141views Fuzzy Logic» more  EUSFLAT 2009»
13 years 8 months ago
An Experimental Study on the Interpretability of Fuzzy Systems
Abstract-- Interpretability is one of the most significant properties of Fuzzy Systems which are widely acknowledged as gray boxes against other Soft Computing techniques such as N...
José M. Alonso, Luis Magdalena
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
14 years 11 months ago
Scalable pseudo-likelihood estimation in hybrid random fields
Learning probabilistic graphical models from high-dimensional datasets is a computationally challenging task. In many interesting applications, the domain dimensionality is such a...
Antonino Freno, Edmondo Trentin, Marco Gori