Sciweavers

206 search results - page 41 / 42
» Analysis of Multivariate Hash Functions
Sort
View
SRDS
2006
IEEE
13 years 12 months ago
Call Availability Prediction in a Telecommunication System: A Data Driven Empirical Approach
Availability prediction in a telecommunication system plays a crucial role in its management, either by alerting the operator to potential failures or by proactively initiating pr...
Günther A. Hoffmann, Miroslaw Malek
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 6 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
IJBRA
2010
121views more  IJBRA 2010»
13 years 4 months ago
Mining Cytochrome b561 proteins from plant genomes
—Cytochrome b561 (Cyt-b561) proteins play important functions in plants such as anti-toxin defense reactions, growth and development, and prevention of damage to plants from exce...
Stephen O. Opiyo, Etsuko N. Moriyama
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
14 years 11 days ago
Fast similarity search in peer-to-peer networks
Abstract—Peer-to-peer (P2P) systems show numerous advantages over centralized systems, such as load balancing, scalability, and fault tolerance, and they require certain function...
Thomas Bocek, Ela Hunt, David Hausheer, Burkhard S...
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
13 years 12 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...