Sciweavers

1266 search results - page 144 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
TMC
2010
137views more  TMC 2010»
15 years 2 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
142
Voted
JMLR
2006
103views more  JMLR 2006»
15 years 4 months ago
MinReg: A Scalable Algorithm for Learning Parsimonious Regulatory Networks in Yeast and Mammals
In recent years, there has been a growing interest in applying Bayesian networks and their extensions to reconstruct regulatory networks from gene expression data. Since the gene ...
Dana Pe'er, Amos Tanay, Aviv Regev
IDMS
2001
Springer
145views Multimedia» more  IDMS 2001»
15 years 8 months ago
A Service Differentiation Scheme for the End-System
A number of research studies show that the operating system has a substantial influence on communication delay in distributed environments. Thus, in order to provide applications w...
Domenico Cotroneo, Massimo Ficco, Giorgio Ventre
INFOCOM
2003
IEEE
15 years 9 months ago
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks
— A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. The data ...
Seema Bandyopadhyay, Edward J. Coyle
AINTEC
2005
Springer
15 years 9 months ago
On the Stability of Server Selection Algorithms Against Network Fluctuations
Abstract. When a set of servers are available for a certain client-server style service, a client selects one of the servers using some server selection algorithm. The best-server ...
Toshiyuki Miyachi, Kenjiro Cho, Yoichi Shinoda