Sciweavers

3319 search results - page 642 / 664
» The topology of dark networks
Sort
View
ADHOC
2005
119views more  ADHOC 2005»
13 years 10 months ago
A link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM
Power management is an important technique to prolong the lifetime of battery-powered wireless ad hoc networks. The fact that the energy consumed in the idle state dominates the t...
Chunyu Hu, Jennifer C. Hou
BMCBI
2004
149views more  BMCBI 2004»
13 years 10 months ago
MiCoViTo: a tool for gene-centric comparison and visualization of yeast transcriptome states
Background: Information obtained by DNA microarray technology gives a rough snapshot of the transcriptome state, i.e., the expression level of all the genes expressed in a cell po...
Gaëlle Lelandais, Philippe Marc, Pierre Vince...
CCR
2004
90views more  CCR 2004»
13 years 10 months ago
A constraint satisfaction approach to testbed embedding services
Today's networking community is becoming increasingly skeptical of the significance of research results founded wholly upon experimental results conducted in simulation. Now, ...
Jeffrey Considine, John W. Byers, Ketan Meyer-Pate...
JSAC
2010
131views more  JSAC 2010»
13 years 9 months ago
BGP Add-Paths: The Scaling/Performance Tradeoffs
— Internet Service Providers design their network with resiliency in mind, having multiple paths towards external IP subnets available at the borders of their network. However, w...
Virginie Van den Schrieck, Pierre François,...
ICUMT
2009
13 years 8 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...