Sciweavers

20197 search results - page 3863 / 4040
» Comparing Computational Power
Sort
View
TCSV
2010
13 years 5 months ago
Cooperative Peer-to-Peer Streaming: An Evolutionary Game-Theoretic Approach
While peer-to-peer (P2P) video streaming systems have achieved promising results, they introduce a large number of unnecessary traverse links, which consequently leads to substanti...
Yan Chen, Beibei Wang, W. Sabrina Lin, Yongle Wu, ...
TDP
2010
166views more  TDP 2010»
13 years 5 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
TITB
2010
128views Education» more  TITB 2010»
13 years 5 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
TON
2010
151views more  TON 2010»
13 years 5 months ago
Measurement-Driven Guidelines for 802.11 WLAN Design
Dense deployments of WLANs suffer from increased interference and as a result, reduced capacity. There are three main functions used to improve the overall network capacity: a) in...
Ioannis Broustis, Konstantina Papagiannaki, Srikan...
BIOINFORMATICS
2011
13 years 5 months ago
All-atom knowledge-based potential for RNA structure prediction and assessment
Motivation: Over the recent years, the vision that RNA simply serves as information transfer molecule has dramatically changed. The study of the sequence/structure/function relati...
Emidio Capriotti, Tomás Norambuena, Marc A....
« Prev « First page 3863 / 4040 Last » Next »