Sciweavers

1240 search results - page 246 / 248
» Composition with Target Constraints
Sort
View
TC
1998
13 years 7 months ago
Algorithms for Variable Length Subnet Address Assignment
In a computer network that consists of M subnetworks, the L-bit address of a machine consists of two parts: A pre x si that contains the address of the subnetwork to which the mac...
Mikhail J. Atallah, Douglas Comer
SIGGRAPH
2010
ACM
13 years 6 months ago
Nonlinear disparity mapping for stereoscopic 3D
This paper addresses the problem of remapping the disparity range of stereoscopic images and video. Such operations are highly important for a variety of issues arising from the p...
Manuel Lang, Alexander Hornung, Oliver Wang, Steve...
TPDS
2010
109views more  TPDS 2010»
13 years 5 months ago
Distributed Network Formation for n-Way Broadcast Applications
—In an n-way broadcast application, each one of n overlay nodes wants to push its own distinct large data file to all other n À 1 destinations as well as download their respecti...
Georgios Smaragdakis, Nikolaos Laoutaris, Pietro M...
WABI
2010
Springer
167views Bioinformatics» more  WABI 2010»
13 years 5 months ago
Quantifying the Strength of Natural Selection of a Motif Sequence
Quantification of selective pressures on regulatory sequences is a central question in studying the evolution of gene regulatory networks. Previous methods focus primarily on sing...
Chen-Hsiang Yeang
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 5 months ago
Securing AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) ...
Kamaljit I. Lakhtaria, Bhaskar N. Patel, Satish G....