Sciweavers

2493 search results - page 474 / 499
» A survey of network virtualization
Sort
View
BMCBI
2008
128views more  BMCBI 2008»
14 years 10 months ago
Meta-analysis of breast cancer microarray studies in conjunction with conserved cis-elements suggest patterns for coordinate reg
Background: Gene expression measurements from breast cancer (BrCa) tumors are established clinical predictive tools to identify tumor subtypes, identify patients showing poor/good...
David D. Smith, Pål Sætrom, Ola R. Sn&...
WWW
2002
ACM
15 years 10 months ago
A graphical user interface toolkit approach to thin-client computing
Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a ...
Simon Lok, Steven Feiner, William M. Chiong, Yoav ...
ICCSA
2010
Springer
15 years 4 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
MOBIHOC
2009
ACM
15 years 4 months ago
Revenue generation for truthful spectrum auction in dynamic spectrum access
Spectrum is a critical yet scarce resource and it has been shown that dynamic spectrum access can significantly improve spectrum utilization. To achieve this, it is important to ...
Juncheng Jia, Qian Zhang, Qin Zhang, Mingyan Liu
INFOCOM
2009
IEEE
15 years 4 months ago
Multi-VPN Optimization for Scalable Routing via Relaying
—Enterprise networks are increasingly adopting Layer 3 Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) technology to connect geographically disparate locations...
MohammadHossein Bateni, Alexandre Gerber, Mohammad...