Sciweavers

537 search results - page 82 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
DMSN
2006
ACM
15 years 1 months ago
Processing proximity queries in sensor networks
Sensor networks are often used to perform monitoring tasks, such as in animal or vehicle tracking and in surveillance of enemy forces in military applications. In this paper we in...
Yannis Kotidis
BMCBI
2008
103views more  BMCBI 2008»
14 years 10 months ago
Parameter estimation for robust HMM analysis of ChIP-chip data
Background: Tiling arrays are an important tool for the study of transcriptional activity, proteinDNA interactions and chromatin structure on a genome-wide scale at high resolutio...
Peter Humburg, David Bulger, Glenn Stone
ICDE
2005
IEEE
103views Database» more  ICDE 2005»
15 years 11 months ago
Vectorizing and Querying Large XML Repositories
Vertical partitioning is a well-known technique for optimizing query performance in relational databases. An extreme form of this technique, which we call vectorization, is to sto...
Peter Buneman, Byron Choi, Wenfei Fan, Robert Hutc...
WWW
2005
ACM
15 years 10 months ago
The WT10G dataset and the evolution of the web
The purpose of this paper is threefold. First, we study the evolution of the web based on data available from an earlier snapshot of the web and compare the results with those pre...
Wei-Tsen Milly Chiang, Markus Hagenbuchner, Ah Chu...
MOBIHOC
2001
ACM
15 years 9 months ago
A probabilistic analysis for the range assignment problem in ad hoc networks
In this paper we consider the following problem for ad hoc networks: assume that n nodes are distributed in a d-dimensional region, with 1d3, and assume that all the nodes have th...
Paolo Santi, Douglas M. Blough, Feodor S. Vainstei...