Sciweavers

5345 search results - page 1032 / 1069
» Using a Technique from Graphic Designers to Develop Innovati...
Sort
View
JSAC
2006
181views more  JSAC 2006»
13 years 7 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
BMCBI
2005
132views more  BMCBI 2005»
13 years 7 months ago
CLPM: A Cross-Linked Peptide Mapping Algorithm for Mass Spectrometric Analysis
Background: Protein-protein, protein-DNA and protein-RNA interactions are of central importance in biological systems. Quadrapole Time-of-flight (Q-TOF) mass spectrometry is a sen...
Yong Tang, Yingfeng Chen, Cheryl F. Lichti, Roger ...
IPPS
1998
IEEE
13 years 12 months ago
Configuration Independent Analysis for Characterizing Shared-Memory Applications
Characterizing shared-memory applications provides insight to design efficient systems, and provides awareness to identify and correct application performance bottlenecks. Configu...
Gheith A. Abandah, Edward S. Davidson
ICCAD
2009
IEEE
133views Hardware» more  ICCAD 2009»
13 years 5 months ago
A parallel preconditioning strategy for efficient transistor-level circuit simulation
A parallel computing approach for large-scale SPICE-accurate circuit simulation is described that is based on a new preconditioned iterative solver. The preconditioner involves the...
Heidi Thornquist, Eric R. Keiter, Robert J. Hoekst...
SIGCOMM
2009
ACM
14 years 2 months ago
Detailed diagnosis in enterprise networks
By studying trouble tickets from small enterprise networks, we conclude that their operators need detailed fault diagnosis. That is, the diagnostic system should be able to diagno...
Srikanth Kandula, Ratul Mahajan, Patrick Verkaik, ...
« Prev « First page 1032 / 1069 Last » Next »