Sciweavers

834 search results - page 147 / 167
» Quantifying and Measuring Anonymity
Sort
View
BMCBI
2005
126views more  BMCBI 2005»
13 years 9 months ago
An algorithm for automatic evaluation of the spot quality in two-color DNA microarray experiments
Background: Although DNA microarray technologies are very powerful for the simultaneous quantitative characterization of thousands of genes, the quality of the obtained experiment...
Eugene Novikov, Emmanuel Barillot
JCP
2007
143views more  JCP 2007»
13 years 9 months ago
Alternatives for In-Service BER Estimation in All-Optical Networks: Towards Minimum Intrusion
— Combining the existing approaches for optical intelligence and the speed and capacity of light is undoubtedly the only viable strategy for building future-proof, highspeed netw...
Carolina Pinart
JNW
2007
107views more  JNW 2007»
13 years 9 months ago
Evaluating Performance Characteristics of SIP over IPv6
— Due to the ongoing massive growth of the global Internet, the rising integration of Voice over IP (VoIP) services and the Fixed Mobile Convergence (FMC), the IPv6 protocol and ...
Thomas Hoeher, Martin Petraschek, Slobodanka Tomic...
COMCOM
2004
138views more  COMCOM 2004»
13 years 9 months ago
Issues with inferring Internet topological attributes
A number of recent studies of Internet network structure are based on data collected from inter-domain BGP routing tables and tools, such as traceroute, to probe end-to-end paths....
Lisa Amini, Anees Shaikh, Henning Schulzrinne
TMC
2010
179views more  TMC 2010»
13 years 8 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera