Sciweavers

6266 search results - page 1243 / 1254
» New results on the computability and complexity of points - ...
Sort
View
TMC
2010
130views more  TMC 2010»
13 years 5 months ago
SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes
—This paper presents SYNAPSE++, a system for over the air reprogramming of wireless sensor networks (WSNs). In contrast to previous solutions, which implement plain negative ackn...
Michele Rossi, Nicola Bui, Giovanni Zanca, Luca St...
INFOCOM
2012
IEEE
11 years 10 months ago
CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networks
—A cardinal prerequisite for the system design of a sensor network, is to understand the geometric environment where sensor nodes are deployed. The global topology of a largescal...
Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, C...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 8 months ago
Finding, minimizing, and counting weighted subgraphs
d Abstract] Virginia Vassilevska School of Mathematics Institute for Advanced Study Princeton, NJ 08540 USA virgi@math.ias.edu Ryan Williams School of Mathematics Institute for Adv...
Virginia Vassilevska, Ryan Williams
BMCBI
2005
108views more  BMCBI 2005»
13 years 7 months ago
The modeled structure of the RNA dependent RNA polymerase of GBV-C Virus suggests a role for motif E in Flaviviridae RNA polymer
Background: The Flaviviridae virus family includes major human and animal pathogens. The RNA dependent RNA polymerase (RdRp) plays a central role in the replication process, and t...
François Ferron, Cécile Bussetta, H&...
WWW
2009
ACM
14 years 8 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
« Prev « First page 1243 / 1254 Last » Next »