Sciweavers

1620 search results - page 310 / 324
» Use Case Level Pointcuts
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks
—Tracking of movements such as that of people, animals, vehicles, or of phenomena such as fire, can be achieved by deploying a wireless sensor network. So far only prototype sys...
Paul Balister, Zizhan Zheng, Santosh Kumar, Prasun...
INFOCOM
2009
IEEE
14 years 2 months ago
Keep Cache Replacement Simple in Peer-Assisted VoD Systems
—Peer-assisted Video-on-Demand (VoD) systems have not only received substantial recent research attention, but also been implemented and deployed with success in large-scale real...
Jiahua Wu, Baochun Li
BIBM
2007
IEEE
137views Bioinformatics» more  BIBM 2007»
14 years 1 months ago
A Multi-metric Similarity Based Analysis of Microarray Data
Clustering has been shown to be effective in analyzing functional relationships of genes. However, no single clustering method with single distance metric is capable of capturing ...
Fatih Altiparmak, Selnur Erdal, Ozgur Ozturk, Haka...
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
14 years 1 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
NCA
2007
IEEE
14 years 1 months ago
Transparent Reliable Multicast for Ethernet-Based Storage Area Networks
As disk storage density increases and data availability requirements become ever more demanding, data replication is increasingly an indispensable feature of enterprise-class stor...
Shibiao Lin, Maohua Lu, Tzi-cker Chiueh