Sciweavers

1869 search results - page 356 / 374
» Analysis of Network Processing Workloads
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 3 months ago
High-throughput Protein Interactome Data: Minable or Not?
There is an emerging trend in post-genome biology to study the collection of thousands of protein interaction pairs (protein interactome) derived from high-throughput experiments....
Jake Yue Chen, Andrey Y. Sivachenko, Lang Li
MOBISYS
2007
ACM
16 years 2 months ago
SmartSiren: virus detection and alert for smartphones
Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devi...
Jerry Cheng, Starsky H. Y. Wong, Hao Yang, Songwu ...
INFOCOM
2009
IEEE
15 years 10 months ago
Distributed Opportunistic Scheduling With Two-Level Channel Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
NDSS
2008
IEEE
15 years 9 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
WCNC
2008
IEEE
15 years 9 months ago
Quantize-and-Forward Relaying with M-ary Phase Shift Keying
Abstract—Using cooperative transmission, two or more singleantenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol tha...
Michael R. Souryal, Huiqing You