Sciweavers

972 search results - page 118 / 195
» Design and Protocol for Internet Accessible Mathematical Com...
Sort
View
IMC
2009
ACM
14 years 4 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...
SIGCOMM
2009
ACM
14 years 4 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
NAR
2011
219views Computer Vision» more  NAR 2011»
13 years 1 months ago
SCLD: a stem cell lineage database for the annotation of cell types and developmental lineages
Stem cell biology has experienced explosive growth over the past decade as researchers attempt to generate therapeutically relevant cell types in the laboratory. Recapitulation of...
Edward Hemphill, Asav P. Dharia, Chih Lee, Carolin...
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 3 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
IDTRUST
2009
ACM
14 years 5 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper