Sciweavers

3899 search results - page 692 / 780
» Argumentation for Access Control
Sort
View
MOBICOM
2010
ACM
13 years 10 months ago
Fair WLAN backhaul aggregation
Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP a...
Domenico Giustiniano, Eduard Goma Llairo, Alberto ...
BMCBI
2007
145views more  BMCBI 2007»
13 years 10 months ago
BioPP: a tool for web-publication of biological networks
Background: Cellular processes depend on the function of intracellular molecular networks. The curation of the literature relevant to specific biological pathways is important for...
Ganesh A. Viswanathan, German Nudelman, Sonali Pat...
BMCBI
2008
160views more  BMCBI 2008»
13 years 10 months ago
VariVis: a visualisation toolkit for variation databases
Background: With the completion of the Human Genome Project and recent advancements in mutation detection technologies, the volume of data available on genetic variations has rise...
Timothy D. Smith, Richard G. H. Cotton
CORR
2010
Springer
224views Education» more  CORR 2010»
13 years 10 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam
COMCOM
2007
100views more  COMCOM 2007»
13 years 10 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia