Sciweavers

2169 search results - page 408 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
COMSUR
2006
84views more  COMSUR 2006»
13 years 7 months ago
A survey of handover algorithms in DVB-H
Digital Video Broadcasting for Handhelds (DVB-H) is a standard for broadcasting IP Datacast (IPDC) services to mobile handheld terminals. Based on the DVB-T standard, DVB-H adds n...
Xiaodong Yang, Jani Väre, Thomas J. Owens
BMCBI
2004
146views more  BMCBI 2004»
13 years 7 months ago
Multivariate search for differentially expressed gene combinations
Background: To identify differentially expressed genes, it is standard practice to test a twosample hypothesis for each gene with a proper adjustment for multiple testing. Such te...
Yuanhui Xiao, Robert D. Frisina, Alexander Gordon,...
MOBIHOC
2005
ACM
14 years 7 months ago
TCP with adaptive pacing for multihop wireless networks
In this paper, we introduce a novel congestion control algorithm for TCP over multihop IEEE 802.11 wireless networks implementing rate-based scheduling of transmissions within the...
Sherif M. ElRakabawy, Alexander Klemm, Christoph L...
VEE
2009
ACM
240views Virtualization» more  VEE 2009»
14 years 2 months ago
Memory buddies: exploiting page sharing for smart colocation in virtualized data centers
Many data center virtualization solutions, such as VMware ESX, employ content-based page sharing to consolidate the resources of multiple servers. Page sharing identifies virtual...
Timothy Wood, Gabriel Tarasuk-Levin, Prashant J. S...
IWSEC
2009
Springer
14 years 2 months ago
Improved Distinguishing Attacks on HC-256
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM com...
Gautham Sekar, Bart Preneel