Sciweavers

8135 search results - page 1418 / 1627
» network 2008
Sort
View
BMCBI
2008
124views more  BMCBI 2008»
15 years 4 months ago
Ontology-based, Tissue MicroArray oriented, image centered tissue bank
Background: Tissue MicroArray technique is becoming increasingly important in pathology for the validation of experimental data from transcriptomic analysis. This approach produce...
Federica Viti, Ivan Merelli, Andrea Caprera, Barba...
JUCS
2008
148views more  JUCS 2008»
15 years 4 months ago
An Optimization of CDN Using Efficient Load Distribution and RADS Caching Algorithm
: Nowadays, while large-sized multimedia objects are becoming very popular throughout the Internet, one of the important issues appears to be the acceleration of content delivery n...
Yun Ji Na, Sarvar R. Abdullaev, Franz I. S. Ko
TSP
2008
149views more  TSP 2008»
15 years 4 months ago
Decentralized Quantized Kalman Filtering With Scalable Communication Cost
Estimation and tracking of generally nonstationary Markov processes is of paramount importance for applications such as localization and navigation. In this context, ad hoc wireles...
Eric J. Msechu, Stergios I. Roumeliotis, Alejandro...
WICOMM
2008
139views more  WICOMM 2008»
15 years 3 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
JUCS
2008
113views more  JUCS 2008»
15 years 4 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
« Prev « First page 1418 / 1627 Last » Next »