Sciweavers

7741 search results - page 1496 / 1549
» Security in Active Networks
Sort
View
BROADBAND
1998
15 years 5 months ago
Multipath FEC scheme for the ATM adaptation layer AAL5
One approach to facilitate statistical multiplexing of bursty sources in ATM networks is dispersion of the traffic over independent paths. It has been shown within the literature ...
Georg Carle, Stefan Dresler, Jochen H. Schiller
AC
2007
Springer
15 years 4 months ago
Free/Open Source Software Development: Recent Research Results and Methods
The focus of this chapter is to review what is known about free and open source software development (FOSSD) work practices, development processes, project and community dynamics,...
Walt Scacchi
BMCBI
2010
149views more  BMCBI 2010»
15 years 4 months ago
KID - an algorithm for fast and efficient text mining used to automatically generate a database containing kinetic information o
Background: The amount of available biological information is rapidly increasing and the focus of biological research has moved from single components to networks and even larger ...
Stephanie Heinen, Bernhard Thielen, Dietmar Schomb...
BMCBI
2008
165views more  BMCBI 2008»
15 years 4 months ago
SWS: accessing SRS sites contents through Web Services
Background: Web Services and Workflow Management Systems can support creation and deployment of network systems, able to automate data analysis and retrieval processes in biomedic...
Paolo Romano 0001, Domenico Marra
INFOCOM
2010
IEEE
15 years 4 months ago
Walking in Facebook: A Case Study of Unbiased Sampling of OSNs
With more than 250 million active users, Facebook (FB) is currently one of the most important online social networks. Our goal in this paper is to obtain a representative (unbiased...
Minas Gjoka, Maciej Kurant, Carter T. Butts, Athin...
« Prev « First page 1496 / 1549 Last » Next »