Sciweavers

451 search results - page 89 / 91
» Update on economic approach to simulation selection problems
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 5 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
BMCBI
2007
113views more  BMCBI 2007»
13 years 5 months ago
Statistical power of phylo-HMM for evolutionarily conserved element detection
Background: An important goal of comparative genomics is the identification of functional elements through conservation analysis. Phylo-HMM was recently introduced to detect conse...
Xiaodan Fan, Jun Zhu, Eric E. Schadt, Jun S. Liu
INFOCOM
2008
IEEE
13 years 11 months ago
On Reducing Mesh Delay for Peer-to-Peer Live Streaming
—Peer-to-peer (P2P) technology has emerged as a promising scalable solution for live streaming to large group. In this paper, we address the design of overlay which achieves low ...
Dongni Ren, Y.-T. Hillman Li, Shueng-Han Gary Chan
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
13 years 11 months ago
Performance Analysis of a Middleware Demultiplexing Pattern
A key enabler of the recently adopted, assemblycentric development approach for distributed real-time software systems is QoS-enabled middleware, which provides reusable building ...
U. Praphamontripong, Swapna S. Gokhale, Aniruddha ...
ICC
2007
IEEE
115views Communications» more  ICC 2007»
13 years 9 months ago
Super-Wideband SSN Suppression in High-Speed Digital Communication Systems by Using Multi-Via Electromagnetic Bandgap Structures
With the advance of semiconductor manufacturing, There are many approaches to deal with these problems. EDA, and VLSI design technologies, circuits with even higher Adding discrete...
MuShui Zhang, YuShan Li, LiPing Li, Chen Jia