Sciweavers

7329 search results - page 1430 / 1466
» Network Extractor Protocols
Sort
View
98
Voted
IWANN
2007
Springer
15 years 8 months ago
Towards the Integration of a Bioprofile in Ocular Melanoma
Approximately 50% of all patients with intraocular melanoma die of metastatic disease, despite successful treatment of the primary tumour. The main factors associated with mortalit...
Azzam F. Taktak, Antonio Eleuteri, Christian Setzk...
112
Voted
WDAG
2007
Springer
73views Algorithms» more  WDAG 2007»
15 years 8 months ago
On Self-stabilizing Synchronous Actions Despite Byzantine Attacks
Consider a distributed network of n nodes that is connected to a global source of “beats”. All nodes receive the “beats” simultaneously, and operate in lock-step. A scheme ...
Danny Dolev, Ezra N. Hoch
TRIDENTCOM
2006
IEEE
15 years 8 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
109
Voted
IMC
2006
ACM
15 years 8 months ago
Fisher information of sampled packets: an application to flow size estimation
Packet sampling is widely used in network monitoring. Sampled packet streams are often used to determine flow-level statistics of network traffic. To date there is conflicting e...
Bruno F. Ribeiro, Donald F. Towsley, Tao Ye, Jean ...
110
Voted
MM
2006
ACM
119views Multimedia» more  MM 2006»
15 years 8 months ago
Modelling dependency in multimedia streams
Expressing and analysing data dependency in multimedia streams is promising, since content-aware policies at a transport level would benefit from such services. In this paper we ...
Alexander Eichhorn
« Prev « First page 1430 / 1466 Last » Next »