Sciweavers

5234 search results - page 1037 / 1047
» Simulation of Computer Network Attacks
Sort
View
BMCBI
2007
158views more  BMCBI 2007»
13 years 10 months ago
Penalized likelihood for sparse contingency tables with an application to full-length cDNA libraries
Background: The joint analysis of several categorical variables is a common task in many areas of biology, and is becoming central to systems biology investigations whose goal is ...
Corinne Dahinden, Giovanni Parmigiani, Mark C. Eme...
CGA
2008
13 years 10 months ago
Interactive Reconfiguration of Urban Layouts
The ability to create and edit a model of a large-scale city is necessary for a variety of applications such as web-based navigation (e.g., MapQuest, GoogleEarth), emergency respo...
Daniel G. Aliaga, Bedrich Benes, Carlos A. Vanegas...
IPPS
2010
IEEE
13 years 8 months ago
Scalable multi-pipeline architecture for high performance multi-pattern string matching
Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed deep packet inspection (DPI). Although Aho...
Weirong Jiang, Yi-Hua Edward Yang, Viktor K. Prasa...
IPPS
2010
IEEE
13 years 8 months ago
On the importance of bandwidth control mechanisms for scheduling on large scale heterogeneous platforms
We study three scheduling problems (file redistribution, independent tasks scheduling and broadcasting) on large scale heterogeneous platforms under the Bounded Multi-port Model. I...
Olivier Beaumont, Hejer Rejeb
TCSV
2010
13 years 4 months ago
Cooperative Peer-to-Peer Streaming: An Evolutionary Game-Theoretic Approach
While peer-to-peer (P2P) video streaming systems have achieved promising results, they introduce a large number of unnecessary traverse links, which consequently leads to substanti...
Yan Chen, Beibei Wang, W. Sabrina Lin, Yongle Wu, ...
« Prev « First page 1037 / 1047 Last » Next »