Sciweavers

3238 search results - page 469 / 648
» Not Enough Points Is Enough
Sort
View
IJCBDD
2010
127views more  IJCBDD 2010»
13 years 9 months ago
Predicting protein complexes by data integration of different types of interactions
: The explosion of highthroughput interaction data from proteomics studies gives us the opportunity to integrate Protein-Protein Interactions (PPI) from different type of interacti...
Powell Patrick Cheng Tan, Daryanaz Dargahi, Freder...
IJIPT
2010
147views more  IJIPT 2010»
13 years 9 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
IMAMCI
2010
60views more  IMAMCI 2010»
13 years 9 months ago
Null boundary controllability of a circular elastic arch
We consider a circular arch of thickness ε and curvature r−1 whose elastic deformations are described by a 2×2 system of linear partial differential equation. The system - of...
Arnaud Münch
INFOCOM
2010
IEEE
13 years 9 months ago
MIMO-Aware Routing in Wireless Mesh Networks
Abstract—Multiple-input and multiple-output (MIMO) technique is considered as one of the most promising emerging wireless technologies that can significantly improve transmissio...
Shan Chu, Xin Wang
INFOCOM
2010
IEEE
13 years 9 months ago
Wireless Network Virtualization as A Sequential Auction Game
—We propose a virtualization framework to separate the network operator (NO) who focuses on wireless resource management and service providers (SP) who target distinct objectives...
Fangwen Fu, Ulas C. Kozat