Sciweavers

981 search results - page 88 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
BMCBI
2010
140views more  BMCBI 2010»
14 years 8 months ago
An improved machine learning protocol for the identification of correct Sequest search results
Background: Mass spectrometry has become a standard method by which the proteomic profile of cell or tissue samples is characterized. To fully take advantage of tandem mass spectr...
Morten Kallberg, Hui Lu
ICDCS
2006
IEEE
15 years 5 months ago
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP
Peer-to-peer (P2P) technology has been successfully applied in Internet telephony or Voice over Internet Protocol (VoIP), such as the Skype system, where P2P is used for both sear...
Shansi Ren, Lei Guo, Xiaodong Zhang
GLOBECOM
2008
IEEE
15 years 5 months ago
A Distributed Multi-User MIMO MAC Protocol for Wireless Local Area Networks
— Multi-user multiple-input multiple-output (MIMO) systems have been emerging and attracting considerable attention recently for its potential to substantially improve system cap...
Lin X. Cai, Hangguan Shan, Weihua Zhuang, Xuemin S...
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 3 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
GLOBECOM
2008
IEEE
15 years 5 months ago
Throughput Analysis of Wireless Relay Slotted ALOHA Systems with Network Coding
—This paper deals with a simple but essential two-hop wireless relay network employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded...
Daisuke Umehara, Tomoya Hirano, Satoshi Denno, Mas...