Sciweavers

537 search results - page 99 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
BMCBI
2010
208views more  BMCBI 2010»
14 years 10 months ago
Calculation of accurate small angle X-ray scattering curves from coarse-grained protein models
Background: Genome sequencing projects have expanded the gap between the amount of known protein sequences and structures. The limitations of current high resolution structure det...
Kasper Stovgaard, Christian Andreetta, Jesper Ferk...
IANDC
2008
92views more  IANDC 2008»
14 years 9 months ago
Tree exploration with advice
We study the amount of knowledge about the network that is required in order to efficiently solve a task concerning this network. The impact of available information on the effici...
Pierre Fraigniaud, David Ilcinkas, Andrzej Pelc
IANDC
2011
127views more  IANDC 2011»
14 years 4 months ago
On the consistency, expressiveness, and precision of partial modeling formalisms
Partial transition systems support abstract model checking of complex temporal propercombining both over- and under-approximatingabstractions into a single model. Over the years, ...
Ou Wei, Arie Gurfinkel, Marsha Chechik
SENSYS
2009
ACM
15 years 4 months ago
Integrated distributed energy awareness for wireless sensor networks
Energy in sensor networks is a distributed, non-transferable resource. Over time, differences in energy availability are likely to arise. Protocols like routing trees may concent...
Geoffrey Werner Challen, Jason Waterman, Matt Wels...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand