Sciweavers

985 search results - page 174 / 197
» Modeling and analysis of two-flow interactions in wireless n...
Sort
View
WIOPT
2005
IEEE
14 years 29 days ago
Performance Measurements of the Saturation Throughput in IEEE 802.11 Access Points
— Performance measurements of IEEE 802.11 access points provide important information for networking research and network management. In this paper, we present an active measurem...
Enrico Pelletta, Hector Velayos
CCS
2001
ACM
13 years 12 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
BMCBI
2004
177views more  BMCBI 2004»
13 years 7 months ago
Gapped alignment of protein sequence motifs through Monte Carlo optimization of a hidden Markov model
Background: Certain protein families are highly conserved across distantly related organisms and belong to large and functionally diverse superfamilies. The patterns of conservati...
Andrew F. Neuwald, Jun S. Liu
SIGIR
2010
ACM
13 years 11 months ago
Entity information management in complex networks
Entity information management (EIM) is a nascent IR research area that investigates the information management process about entities instead of documents. It is motivated by the ...
Yi Fang
MOBISYS
2005
ACM
14 years 7 months ago
A relative positioning system for co-located mobile devices
If a mobile computing device knows how it is positioned and oriented in relation to other devices nearby, then it can provide enhanced support for multi-device and multi-user inte...
Mike Hazas, Christian Kray, Hans-Werner Gellersen,...