Sciweavers

595 search results - page 57 / 119
» Survivability Analysis of Network Specifications
Sort
View
BMCBI
2006
117views more  BMCBI 2006»
15 years 4 months ago
The Cluster Variation Method for Efficient Linkage Analysis on Extended Pedigrees
Background: Computing exact multipoint LOD scores for extended pedigrees rapidly becomes infeasible as the number of markers and untyped individuals increase. When markers are exc...
Cornelis A. Albers, Martijn A. R. Leisink, Hilbert...

Publication
391views
16 years 5 months ago
Pedestrian access to transit: Identifying redundancies and gaps using a variable service area analysis
Identifying the percentage of the population being served by a transit system in a metropolitan region is a key performance measure. This performance measure depends mainly on the ...
El-Geneidy, A., Tétreault, P. & Surprenant-Legaul...
SAC
2004
ACM
15 years 9 months ago
Combining analysis and synthesis in a model of a biological cell
for ideas, and then abstract away from these ideas to produce algorithmic processes that can create problem solutions in a bottom-up manner. We have previously described a top-dow...
Ken Webb, Tony White
CCS
2006
ACM
15 years 7 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
161
Voted
TMC
2008
112views more  TMC 2008»
15 years 4 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori