Sciweavers

218 search results - page 34 / 44
» Composite Binary Losses
Sort
View
COMCOM
2007
99views more  COMCOM 2007»
13 years 7 months ago
Topology-aware overlay path probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2 ), which is prohibitive in large-scale...
Chiping Tang, Philip K. McKinley
JAR
2008
115views more  JAR 2008»
13 years 7 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
JALC
2006
87views more  JALC 2006»
13 years 7 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
BMCBI
2005
120views more  BMCBI 2005»
13 years 7 months ago
pSLIP: SVM based protein subcellular localization prediction using multiple physicochemical properties
Background: Protein subcellular localization is an important determinant of protein function and hence, reliable methods for prediction of localization are needed. A number of pre...
Deepak Sarda, Gek Huey Chua, Kuo-Bin Li, Arun Kris...
AGIS
2000
54views more  AGIS 2000»
13 years 7 months ago
The Application of Earth Science Findings to the Practical Problems of Growing Winegrapes
Transforming science findings into practical applications is presented in the specific case of using remote sensing to detect the presence of an infestation of grapevines. The vin...
David L. Peterson, Lee F. Johnson