Sciweavers

1080 search results - page 200 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
131
Voted
BMCBI
2010
116views more  BMCBI 2010»
15 years 3 months ago
permGPU: Using graphics processing units in RNA microarray association studies
Background: Many analyses of microarray association studies involve permutation, bootstrap resampling and crossvalidation, that are ideally formulated as embarrassingly parallel c...
Ivo D. Shterev, Sin-Ho Jung, Stephen L. George, Ko...
BMCBI
2007
102views more  BMCBI 2007»
15 years 3 months ago
A comprehensive system for evaluation of remote sequence similarity detection
Background: Accurate and sensitive performance evaluation is crucial for both effective development of better structure prediction methods based on sequence similarity, and for th...
Yuan Qi, Ruslan Sadreyev, Yong Wang, Bong-Hyun Kim...
147
Voted
TMC
2008
109views more  TMC 2008»
15 years 3 months ago
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks
Key predistribution has been claimed to be the only viable approach for establishing shared keys between neighboring sensors after deployment for a typical sensor network. However,...
Fang Liu, Xiuzhen Cheng, Liran Ma, Kai Xing
154
Voted
TASE
2010
IEEE
14 years 10 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
174
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang