Sciweavers

426 search results - page 78 / 86
» The Architecture of a Mobile Emergency Plan Deployment Syste...
Sort
View
BMCBI
2007
203views more  BMCBI 2007»
13 years 7 months ago
A Grid-based solution for management and analysis of microarrays in distributed experiments
Several systems have been presented in the last years in order to manage the complexity of large microarray experiments. Although good results have been achieved, most systems ten...
Ivan Porro, Livia Torterolo, Luca Corradi, Marco F...
JSAC
2006
156views more  JSAC 2006»
13 years 7 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
IMC
2010
ACM
13 years 5 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
DAC
2009
ACM
14 years 8 months ago
Power modeling of graphical user interfaces on OLED displays
Emerging organic light-emitting diode (OLED)-based displays obviate external lighting; and consume drastically different power when displaying different colors, due to their emiss...
Mian Dong, Yung-Seok Kevin Choi, Lin Zhong
ICDS
2009
IEEE
14 years 2 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton