Sciweavers

1522 search results - page 194 / 305
» Use of Devolved Controllers in Data Center Networks
Sort
View
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
LCN
1999
IEEE
14 years 1 months ago
Measured Performance of the IEEE 802.11 Wireless LAN
The practical network performances of two commercial IEEE 802.11 compliant wireless local area networks (WLANs) are measured at the medium access control sublayer. A number of tes...
Benny Bing
BMCBI
2010
135views more  BMCBI 2010»
13 years 9 months ago
Delineation of amplification, hybridization and location effects in microarray data yields better-quality normalization
Background: Oligonucleotide arrays have become one of the most widely used high-throughput tools in biology. Due to their sensitivity to experimental conditions, normalization is ...
Marc Hulsman, Anouk Mentink, Eugene P. van Someren...
BMCBI
2008
108views more  BMCBI 2008»
13 years 9 months ago
New application of intelligent agents in sporadic amyotrophic lateral sclerosis identifies unexpected specific genetic backgroun
Background: Few genetic factors predisposing to the sporadic form of amyotrophic lateral sclerosis (ALS) have been identified, but the pathology itself seems to be a true multifac...
Silvana Penco, Massimo Buscema, Maria Cristina Pat...
INFOCOM
2003
IEEE
14 years 2 months ago
On-demand Power Management for Ad Hoc Networks
— Battery power is an important resource in ad hoc networks. It has been observed that in ad hoc networks, energy consumption does not reflect the communication activities in th...
Rong Zheng, Robin Kravets