Sciweavers

7741 search results - page 1499 / 1549
» Security in Active Networks
Sort
View
NAR
1998
121views more  NAR 1998»
15 years 3 months ago
The Nuclear Receptor Resource: a growing family
Last year, the original Glucocorticoid Receptor Resource expanded into a comprehensive project: the Nuclear Receptor Resource (NRR, http://nrr.georgetown.edu/nrr/ nrr.html ). The ...
Elisabeth Martinez, David D. Moore, Evan Keller, D...
149
Voted
CCR
2008
85views more  CCR 2008»
15 years 3 months ago
On cycles in AS relationships
y be more complex than the course modeling abstraction we adopted in [2]. Real AS relationships may depend on a peering point, prefix, and even time [2]. For example, ISPs that dom...
Xenofontas A. Dimitropoulos, M. Ángeles Ser...
CORR
2010
Springer
118views Education» more  CORR 2010»
15 years 3 months ago
Large scale probabilistic available bandwidth estimation
The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: i) most tools report a point...
Frederic Thouin, Mark Coates, Michael G. Rabbat
INFOCOM
2010
IEEE
15 years 2 months ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...
138
Voted
PERCOM
2010
ACM
15 years 2 months ago
Towards wearable sensing-based assessment of fluid intake
—Fluid intake is an important information for many health and assisted living applications. At the same time it is inherently difficult to monitor. Existing reliable solutions r...
Oliver Amft, David Bannach, Gerald Pirkl, Matthias...
« Prev « First page 1499 / 1549 Last » Next »