Sciweavers

1960 search results - page 233 / 392
» The Logic of Large Enough
Sort
View
HSNMC
2004
Springer
125views Multimedia» more  HSNMC 2004»
14 years 4 months ago
A Pull-Based Approach for a VoD Service in P2P Networks
We study a new approach to provide an efficient VoD service to a large client population in P2P networks. Previous work has suggested to construct a multicast tree to distribute t...
Anwar Al Hamra, Ernst W. Biersack, Guillaume Urvoy...
CSB
2003
IEEE
121views Bioinformatics» more  CSB 2003»
14 years 4 months ago
Epitope Prediction Algorithms for Peptide based Vaccine Design
Peptide-based vaccines, in which small peptides derived from target proteins (epitopes) are used to provoke an immune reaction, have attracted considerable attention recently as a...
Liliana Florea, Bjarni V. Halldórsson, Oliv...
LICS
2002
IEEE
14 years 3 months ago
Probabilistic Abstraction for Model Checking: An Approach Based on Property Testing
istic Abstraction for Model Checking: an Approach Based on Property Testing∗ Sophie Laplante† Richard Lassaigne‡ Fr´ed´eric Magniez§ Sylvain Peyronnet† Michel de Rougemo...
Sophie Laplante, Richard Lassaigne, Fréd&ea...
COMPSAC
2009
IEEE
14 years 3 months ago
Towards a Next-Generation Matrix Library for Java
Matrices are essential in many fields of computer science, especially when large amounts of data must be handled efficiently. Despite this demand for matrix software, we were una...
Holger Arndt, Markus Bundschus, Andreas Naegele
AIMS
2009
Springer
14 years 3 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...