Sciweavers

421 search results - page 54 / 85
» String Distances and Uniformities
Sort
View
APPROX
2008
Springer
71views Algorithms» more  APPROX 2008»
13 years 10 months ago
Tight Bounds for Hashing Block Sources
It is known that if a 2-universal hash function H is applied to elements of a block source (X1, . . . , XT ), where each item Xi has enough min-entropy conditioned on the previous...
Kai-Min Chung, Salil P. Vadhan
ICWN
2004
13 years 10 months ago
Does Cluster Architecture Enhance Performance Scalability of Clustered Mobile Ad Hoc Networks?
This paper explains and evaluates the performance of a cluster architecture-based routing protocol, called Link Cluster Protocol (LCP), in mobile ad hoc networks (MANETs). LCP show...
Myeong L. Lim, Chansu Yu
JNW
2006
120views more  JNW 2006»
13 years 8 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
IJBRA
2007
95views more  IJBRA 2007»
13 years 8 months ago
A novel stationary wavelet denoising algorithm for array-based DNA Copy Number data
Abstract: High-throughput array-based assays have recently been developed to detect DNA copy number (DCN) aberrations. The DCN data from these arrays is characterized by high level...
Yuhang Wang, Siling Wang
PVM
2010
Springer
13 years 6 months ago
Adaptive MPI Multirail Tuning for Non-uniform Input/Output Access
Multicore processors have not only reintroduced Non-Uniform Memory Access (NUMA) architectures in nowadays parallel computers, but they are also responsible for non-uniform access ...
Stephanie Moreaud, Brice Goglin, Raymond Namyst