Sciweavers

2135 search results - page 79 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
BMCBI
2010
132views more  BMCBI 2010»
13 years 8 months ago
Protein network prediction and topological analysis in Leishmania major as a tool for drug target selection
Background: Leishmaniasis is a virulent parasitic infection that causes a worldwide disease burden. Most treatments have toxic side-effects and efficacy has decreased due to the e...
Andrés F. Flórez, Daeui Park, Jong B...
EDCC
2008
Springer
13 years 10 months ago
A Distributed Approach to Autonomous Fault Treatment in Spread
This paper presents the design and implementation of the Distributed Autonomous Replication Management (DARM) framework built on top of the Spread group communication system. The ...
Hein Meling, Joakim L. Gilje
EURONGI
2006
Springer
13 years 11 months ago
Performance Analysis of Wireless Multihop Data Networks
We consider wireless multihop data networks with random multi-access mechanisms at the MAC layer. In general, our aim is to study the performance as perceived by users in a dynamic...
Nidhi Hegde, Alexandre Proutiére
NCA
2007
IEEE
13 years 7 months ago
Handling of incomplete data sets using ICA and SOM in data mining
Based on independent component analysis (ICA) and self-organizing maps (SOM), this paper proposes an ISOM-DH model for the incomplete data’s handling in data mining. Under these ...
Hongyi Peng, Siming Zhu
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 9 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin