Sciweavers

29 search results - page 6 / 6
» Index coding via linear programming
Sort
View
JNCA
2011
137views more  JNCA 2011»
12 years 11 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
MOBIQUITOUS
2007
IEEE
13 years 11 months ago
Minimum Disruption Service Composition and Recovery over Mobile Ad Hoc Networks
— The dynamic nature of mobile ad hoc networks poses fundamental challenges to the design of service composition schemes that can minimize the effect of service disruptions. Alth...
Shanshan Jiang, Yuan Xue, Douglas C. Schmidt
CORR
2006
Springer
107views Education» more  CORR 2006»
13 years 4 months ago
Optimal Scheduling of Peer-to-Peer File Dissemination
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are increasingly used for disseminating potentially large files from a server to many end users via the Intern...
Jochen Mundinger, Richard R. Weber, Gideon Weiss
BMCBI
2002
129views more  BMCBI 2002»
13 years 4 months ago
SeqHound: biological sequence and structure database as a platform for bioinformatics research
Background: SeqHound has been developed as an integrated biological sequence, taxonomy, annotation and 3-D structure database system. It provides a high-performance server platfor...
Katerina Michalickova, Gary D. Bader, Michel Dumon...