Sciweavers

3095 search results - page 457 / 619
» Ubiquitous presence systems
Sort
View
BMCBI
2008
89views more  BMCBI 2008»
13 years 9 months ago
Increasing the efficiency of bacterial transcription simulations: When to exclude the genome without loss of accuracy
Background: Simulating the major molecular events inside an Escherichia coli cell can lead to a very large number of reactions that compose its overall behaviour. Not only should ...
Marco A. J. Iafolla, Guang Qiang Dong, David R. Mc...
CORR
2007
Springer
132views Education» more  CORR 2007»
13 years 9 months ago
On Compact Routing for the Internet
The Internet’s routing system is facing stresses due to its poor fundamental scaling properties. Compact routing is a research field that studies fundamental limits of routing ...
Dmitri V. Krioukov, Kimberly C. Claffy, Kevin R. F...
JOC
2007
93views more  JOC 2007»
13 years 9 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
CORR
2004
Springer
177views Education» more  CORR 2004»
13 years 8 months ago
Typestate Checking and Regular Graph Constraints
We introduce regular graph constraints and explore their decidability properties. The motivation for regular graph constraints is 1) type checking of changing types of objects in ...
Viktor Kuncak, Martin C. Rinard
TMC
2010
86views more  TMC 2010»
13 years 3 months ago
Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations
Although the EDCA access mechanism of the 802.11e standard supports legacy DCF stations, the presence of DCF stations in the WLAN jeopardizes the provisioning of the service guaran...
Albert Banchs, Pablo Serrano, Luca Vollero