Sciweavers

8655 search results - page 1449 / 1731
» Challenges for Trusted Computing
Sort
View
140
Voted
ASUNAM
2010
IEEE
15 years 5 months ago
COSI: Cloud Oriented Subgraph Identification in Massive Social Networks
Subgraph matching is a key operation on graph data. Social network (SN) providers may want to find all subgraphs within their social network that "match" certain query gr...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
130
Voted
WICON
2008
15 years 4 months ago
Exploiting parallel networks using dynamic channel scheduling
Many researchers have been focusing on the outcomes and consequences of the rapid increase and proliferation of mobile wireless technologies. If it is not already the case, it wil...
Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, K...
137
Voted
CONEXT
2009
ACM
15 years 4 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
HPDC
2010
IEEE
15 years 4 months ago
Lessons learned from moving earth system grid data sets over a 20 Gbps wide-area network
In preparation for the Intergovernmental Panel on Climate Change (IPCC) Fifth Assessment Report, the climate community will run the Coupled Model Intercomparison Project phase 5 (...
Rajkumar Kettimuthu, Alex Sim, Dan Gunter, Bill Al...
BMCBI
2007
157views more  BMCBI 2007»
15 years 3 months ago
A hybrid multiscale Monte Carlo algorithm (HyMSMC) to cope with disparity in time scales and species populations in intracellula
Background: The fundamental role that intrinsic stochasticity plays in cellular functions has been shown via numerous computational and experimental studies. In the face of such e...
Asawari Samant, Babatunde A. Ogunnaike, Dionisios ...
« Prev « First page 1449 / 1731 Last » Next »