Sciweavers

1522 search results - page 277 / 305
» Use of Devolved Controllers in Data Center Networks
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems
—Increasingly wireless networks use multi-antenna nodes as in IEEE 802.11n and 802.16. The Physical layer (PHY) in such systems may use the antennas to provide multiple streams o...
Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Ch...
IPCCC
1999
IEEE
14 years 4 days ago
Hybrid TCP-UDP transport for Web traffic
: Most of the Web traffic today uses the HyperText Transfer Protocol (HTTP), with the Transmission Control Protocol (TCP) as the underlying transport protocol. TCP provides several...
Israel Cidon, Raphael Rom, Amit Gupta, Christoph L...
BMCBI
2010
153views more  BMCBI 2010»
13 years 6 months ago
DiffCoEx: a simple and sensitive method to find differentially coexpressed gene modules
Background: Large microarray datasets have enabled gene regulation to be studied through coexpression analysis. While numerous methods have been developed for identifying differen...
Bruno M. Tesson, Rainer Breitling, Ritsert C. Jans...
NCA
2007
IEEE
14 years 2 months ago
Scheduling Bulk File Transfers with Start and End Times
The advancement of optical networking technologies has enabled e-science applications that often require transport of large volumes of scientific data. In support of such data-in...
Kannan Rajah, Sanjay Ranka, Ye Xia
DSOM
2003
Springer
14 years 1 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung