Sciweavers

8499 search results - page 1504 / 1700
» network 2007
Sort
View
CONEXT
2007
ACM
14 years 2 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
EMNETS
2007
14 years 2 months ago
Image browsing, processing, and clustering for participatory sensing: lessons from a DietSense prototype
Imagers are an increasingly significant source of sensory observations about human activity and the urban environment. ImageScape is a software tool for processing, clustering, an...
Sasank Reddy, Andrew Parker, Josh Hyman, Jeff Burk...
MP
2007
100views more  MP 2007»
13 years 10 months ago
Power optimization for connectivity problems
Given a graph with costs on the edges, the power of a node is the maximum cost of an edge leaving it, and the power of the graph is the sum of the powers of the nodes of this graph...
Mohammad Taghi Hajiaghayi, Guy Kortsarz, Vahab S. ...
BMCBI
2010
153views more  BMCBI 2010»
13 years 9 months ago
DiffCoEx: a simple and sensitive method to find differentially coexpressed gene modules
Background: Large microarray datasets have enabled gene regulation to be studied through coexpression analysis. While numerous methods have been developed for identifying differen...
Bruno M. Tesson, Rainer Breitling, Ritsert C. Jans...
MOBISYS
2007
ACM
14 years 10 months ago
PageTailor: reusable end-user customization for the mobile web
Most pages on the Web are designed for the desktop environment and render poorly on the small screens available on handheld devices. We introduce Reusable End-User Customization (...
Nilton Bila, Troy Ronda, Iqbal Mohomed, Khai N. Tr...
« Prev « First page 1504 / 1700 Last » Next »