Sciweavers

741 search results - page 78 / 149
» Tools and techniques for Network Forensics
Sort
View
NETWORKING
2007
13 years 10 months ago
Path Selection Using Available Bandwidth Estimation in Overlay-Based Video Streaming
IP networks present a challenging environment for video streaming because they do not provide throughput, jitter, or loss rate guarantees. In this work, we focus on improving the p...
Manish Jain, Constantine Dovrolis
CISIS
2008
IEEE
14 years 3 months ago
Inferring the Function of Genes from Synthetic Lethal Mutations
—Techniques for detecting synthetic lethal mutations in double gene deletion experiments are emerging as powerful tool for analysing genes in parallel or overlapping pathways wit...
Oliver Ray, Christopher H. Bryant
ISMB
2000
13 years 10 months ago
A Pragmatic Information Extraction Strategy for Gathering Data on Genetic Interactions
We present in this paper a pragmatic strategy to perform information extraction from biologic texts. Since the emergence of the information extraction field, techniques have evolv...
Denys Proux, François Rechenmann, Laurent J...
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 3 months ago
Cross-Layer Design of Uplink Multiple-Antenna Interference Cancellation for WLAN with CSMA/CA in Open Access Networks
Abstract— The potential of multi-antenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The me...
Alexandr M. Kuzminskiy, Hamid Reza Karimi
IPL
2010
112views more  IPL 2010»
13 years 7 months ago
The cost of probabilistic agreement in oblivious robot networks
In this paper, we look at the time complexity of two agreement problems in networks of oblivious mobile robots, namely, at the gathering and scattering problems. Given a set of ro...
Julien Clement, Xavier Défago, Maria Gradin...