Sciweavers

13987 search results - page 2740 / 2798
» The Two Guards Problem
Sort
View
121
Voted
BMCBI
2005
104views more  BMCBI 2005»
15 years 2 months ago
Wildfire: distributed, Grid-enabled workflow construction and execution
Background: We observe two trends in bioinformatics: (i) analyses are increasing in complexity, often requiring several applications to be run as a workflow; and (ii) multiple CPU...
Francis Tang, Ching Lian Chua, Liang-Yoong Ho, Yun...
TMC
2008
132views more  TMC 2008»
15 years 2 months ago
A Cross-Layer Approach for Per-Station Fairness in TCP over WLANs
In this paper, we investigate the issue of per-station fairness in TCP over IEEE 802.11-compliant wireless local area networks (WLANs), especially in Wi-Fi hot spots. It is asserte...
Eun-Chan Park, Dong-Young Kim, Hwangnam Kim, Chong...
117
Voted
JCT
2007
140views more  JCT 2007»
15 years 2 months ago
Homomorphisms and edge-colourings of planar graphs
We conjecture that every planar graph of odd-girth 2k + 1 admits a homomorphism to Cayley graph C(Z2k+1 2 , S2k+1), with S2k+1 being the set of (2k + 1)vectors with exactly two co...
Reza Naserasr
101
Voted
TON
2008
109views more  TON 2008»
15 years 2 months ago
On hierarchical traffic grooming in WDM networks
Abstract--The traffic grooming problem is of high practical importance in emerging wide-area wavelength division multiplexing (WDM) optical networks, yet it is intractable for any ...
Bensong Chen, George N. Rouskas, Rudra Dutta
123
Voted
TPDS
2008
133views more  TPDS 2008»
15 years 2 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
« Prev « First page 2740 / 2798 Last » Next »