Sciweavers

184 search results - page 26 / 37
» Data Provenance in Distributed Propagator Networks
Sort
View
ICDCS
1996
IEEE
14 years 2 days ago
Group Routing without Group Routing Tables
We present a group routing protocol for a network of processes. The task of the protocol is to route data messages to each member of a process group. To this end, a tree of proces...
Jorge Arturo Cobb, Mohamed G. Gouda
BMCBI
2010
112views more  BMCBI 2010»
13 years 8 months ago
Orientation-dependent backbone-only residue pair scoring functions for fixed backbone protein design
Background: Empirical scoring functions have proven useful in protein structure modeling. Most such scoring functions depend on protein side chain conformations. However, backbone...
Andrew J. Bordner
NN
2006
Springer
163views Neural Networks» more  NN 2006»
13 years 7 months ago
Machine learning approaches for estimation of prediction interval for the model output
A novel method for estimating prediction uncertainty using machine learning techniques is presented. Uncertainty is expressed in the form of the two quantiles (constituting the pr...
Durga L. Shrestha, Dimitri P. Solomatine
EWSN
2007
Springer
14 years 7 months ago
Energy Consumption of Minimum Energy Coding in CDMA Wireless Sensor Networks
Abstract. A theoretical framework is proposed for accurate performance analysis of minimum energy coding schemes in Coded Division Multiple Access (CDMA) wireless sensor networks. ...
Benigno Zurita Ares, Carlo Fischione, Karl Henrik ...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 2 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana