Sciweavers

7544 search results - page 1500 / 1509
» Network Forensics Analysis
Sort
View
BMCBI
2005
142views more  BMCBI 2005»
13 years 7 months ago
High performance workflow implementation for protein surface characterization using grid technology
Background: This study concerns the development of a high performance workflow that, using grid technology, correlates different kinds of Bioinformatics data, starting from the ba...
Ivan Merelli, Giulia Morra, Daniele D'Agostino, An...
JPDC
2007
112views more  JPDC 2007»
13 years 7 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
TSP
2008
132views more  TSP 2008»
13 years 7 months ago
Differential Modulations for Multinode Cooperative Communications
Abstract--This paper proposes and analyzes differential modulation schemes for two cooperation protocols in multinode cooperative wireless networks; namely, multinode differential ...
Thanongsak Himsoon, W. Pam Siriwongpairat, Weifeng...
JSAC
2007
101views more  JSAC 2007»
13 years 7 months ago
CoopMAC: A Cooperative MAC for Wireless LANs
— Due to the broadcast nature of wireless signals, a wireless transmission intended for a particular destination station can be overheard by other neighboring stations. A focus o...
Pei Liu, Zhifeng Tao, Sathya Narayanan, Thanasis K...
JSAC
2007
116views more  JSAC 2007»
13 years 7 months ago
Outreach: peer-to-peer topology construction towards minimized server bandwidth costs
Abstract— On-demand and live multimedia streaming applications (such as Internet TV) are well known to utilize a significant amount of bandwidth from media streaming servers, es...
Tara Small, Baochun Li, Ben Liang
« Prev « First page 1500 / 1509 Last » Next »