Sciweavers

2924 search results - page 583 / 585
» Modeling Data Consistency in Wireless Sensor Networks
Sort
View
CN
2007
137views more  CN 2007»
13 years 7 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
RECOMB
2006
Springer
14 years 7 months ago
Genome-Wide Discovery of Modulators of Transcriptional Interactions in Human B Lymphocytes
Abstract. Transcriptional interactions in a cell are modulated by a variety of mechanisms that prevent their representation as pure pairwise interactions between a transcription fa...
Kai Wang, Ilya Nemenman, Nilanjana Banerjee, Adam ...
CCR
2008
110views more  CCR 2008»
13 years 7 months ago
Operational comparison of available bandwidth estimation tools
The available bandwidth of a path directly impacts the performance of throughput sensitive applications, e.g., p2p content replication or podcasting. Several tools have been devis...
Guillaume Urvoy-Keller, Taoufik En-Najjary, Alessa...
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Utility-Aware Resource Allocation for Multi-Stream Overlay Multicast
Abstract - Overlay multicast, which performs topology construction and data relaying in the application layer, has recently emerged as a promising vehicle for data distribution. In...
Ji Xu, Jiangchuan Liu, Hsiao-Hwa Chen, Xiao Chu