Sciweavers

1840 search results - page 345 / 368
» The Capacity of String-Duplication Systems
Sort
View
TON
2008
108views more  TON 2008»
13 years 7 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
TMC
2010
141views more  TMC 2010»
13 years 6 months ago
Energy-Optimal Scheduling with Dynamic Channel Acquisition in Wireless Downlinks
—We consider a wireless base station serving L users through L time-varying channels. It is well known that opportunistic scheduling algorithms with full channel state informatio...
Chih-Ping Li, Michael J. Neely
CONEXT
2010
ACM
13 years 5 months ago
Enabling high-bandwidth vehicular content distribution
Abstract -- We present VCD, a novel system for enabling high-bandwidth content distribution in vehicular networks. In VCD, a vehicle opportunistically communicates with nearby acce...
Upendra Shevade, Yi-Chao Chen, Lili Qiu, Yin Zhang...
BMCBI
2010
108views more  BMCBI 2010»
13 years 5 months ago
BIGSdb: Scalable analysis of bacterial genome variation at the population level
Background: The opportunities for bacterial population genomics that are being realised by the application of parallel nucleotide sequencing require novel bioinformatics platforms...
Keith A. Jolley, Martin C. J. Maiden
CN
2010
130views more  CN 2010»
13 years 5 months ago
CoreCast: How core/edge separation can help improving inter-domain live streaming
The rapid growth of broadband access has popularized multimedia services, which nowadays contribute to a large part of Internet traffic. Among this content, the broadcasting of li...
Loránd Jakab, Albert Cabellos-Aparicio, Tho...