Sciweavers

24529 search results - page 4785 / 4906
» Computing on Authenticated Data
Sort
View
137
Voted
BIBE
2005
IEEE
15 years 8 months ago
Selecting Informative Genes from Microarray Dataset by Incorporating Gene Ontology
Selecting informative genes from microarray experiments is one of the most important data analysis steps for deciphering biological information imbedded in such experiments. Howev...
Xian Xu, Aidong Zhang
129
Voted
BROADNETS
2005
IEEE
15 years 8 months ago
Using location information for scheduling in 802.15.3 MAC
— In recent years, UWB has received much attention as a suitable Physical Layer (PHY) for Wireless Personal Area Networks (WPANS). UWB allows for low cost, low power, high bandwi...
Sethuram Balaji Kodeswaran, Anupam Joshi
122
Voted
BROADNETS
2005
IEEE
15 years 8 months ago
Modeling and performance evaluation of ISCSI storage area networks
Abstract— This paper provides a concise modeling and performance evaluation of the iSCSI storage area network (SAN) architecture and protocol. SANs play a key role in business co...
Christoph M. Gauger, Martin Köhn, Sebastian G...
225
Voted
BROADNETS
2005
IEEE
15 years 8 months ago
Bandwidth guaranteed multicast scheduling for virtual output queued packet switches
Multicast enables efficient data transmission from one source to multiple destinations, and has been playing an important role in Internet multimedia applications. Although sever...
Deng Pan, Yuanyuan Yang
CODES
2005
IEEE
15 years 8 months ago
Aggregating processor free time for energy reduction
Even after carefully tuning the memory characteristics to the application properties and the processor speed, during the execution of real applications there are times when the pr...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
« Prev « First page 4785 / 4906 Last » Next »