Sciweavers

634 search results - page 102 / 127
» Some observations on bitTorrent performance
Sort
View
ICDCS
1995
IEEE
13 years 11 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
BMCBI
2007
139views more  BMCBI 2007»
13 years 8 months ago
Improving model predictions for RNA interference activities that use support vector machine regression by combining and filterin
Background: RNA interference (RNAi) is a naturally occurring phenomenon that results in the suppression of a target RNA sequence utilizing a variety of possible methods and pathwa...
Andrew S. Peek
BMCBI
2006
129views more  BMCBI 2006»
13 years 7 months ago
Improved alignment quality by combining evolutionary information, predicted secondary structure and self-organizing maps
Background: Protein sequence alignment is one of the basic tools in bioinformatics. Correct alignments are required for a range of tasks including the derivation of phylogenetic t...
Tomas Ohlson, Varun Aggarwal, Arne Elofsson, Rober...
INFOCOM
2010
IEEE
13 years 6 months ago
Network Coding Tomography for Network Failures
—Network Tomography (or network monitoring) uses end-to-end path-level measurements to characterize the network, such as topology estimation and failure detection. This work prov...
Hongyi Yao, Sidharth Jaggi, Minghua Chen
ACSAC
2010
IEEE
13 years 5 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu