Sciweavers

20197 search results - page 3863 / 4040
» Comparing Computational Power
Sort
View
111
Voted
TCSV
2010
14 years 7 months ago
Cooperative Peer-to-Peer Streaming: An Evolutionary Game-Theoretic Approach
While peer-to-peer (P2P) video streaming systems have achieved promising results, they introduce a large number of unnecessary traverse links, which consequently leads to substanti...
Yan Chen, Beibei Wang, W. Sabrina Lin, Yongle Wu, ...
113
Voted
TDP
2010
166views more  TDP 2010»
14 years 7 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
121
Voted
TITB
2010
128views Education» more  TITB 2010»
14 years 7 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
TON
2010
151views more  TON 2010»
14 years 7 months ago
Measurement-Driven Guidelines for 802.11 WLAN Design
Dense deployments of WLANs suffer from increased interference and as a result, reduced capacity. There are three main functions used to improve the overall network capacity: a) in...
Ioannis Broustis, Konstantina Papagiannaki, Srikan...
110
Voted
BIOINFORMATICS
2011
14 years 7 months ago
All-atom knowledge-based potential for RNA structure prediction and assessment
Motivation: Over the recent years, the vision that RNA simply serves as information transfer molecule has dramatically changed. The study of the sequence/structure/function relati...
Emidio Capriotti, Tomás Norambuena, Marc A....
« Prev « First page 3863 / 4040 Last » Next »