Sciweavers

2135 search results - page 93 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
COMCOM
2004
114views more  COMCOM 2004»
13 years 8 months ago
WFI optimized PWGPS for wireless IP networks
The worst-case fairness index (WFI) has proved to be an important metric in the provision of fairness and bounded delay in both wired and wireless networks. A feature of wireless l...
Fei Xiang, Alan Marshall, Junzhou Luo
E2EMON
2006
IEEE
14 years 2 months ago
A Hybrid Approach for Accurate Application Traffic Identification
—The traffic dynamics of the Internet’s dominant applications, such as peer-to-peer and multimedia, worsen the accuracy of the existing application traffic identification. Ther...
Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung...
DSN
2008
IEEE
13 years 10 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
BIOCOMP
2006
13 years 9 months ago
The Multi-Node Topological Overlap Measure For Gene Neighborhood Analysis
Defining the neighborhood of an initial set of nodes is an important task in network analysis. For example, we show that the neighborhood of an initial set of brain cancer related ...
Ai Li, Steve Horvath
BMCBI
2004
177views more  BMCBI 2004»
13 years 8 months ago
Gapped alignment of protein sequence motifs through Monte Carlo optimization of a hidden Markov model
Background: Certain protein families are highly conserved across distantly related organisms and belong to large and functionally diverse superfamilies. The patterns of conservati...
Andrew F. Neuwald, Jun S. Liu