Sciweavers

335 search results - page 61 / 67
» Efficient Collective Communication on Heterogeneous Networks...
Sort
View
95
Voted
ANCS
2007
ACM
15 years 1 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
MOBIHOC
2010
ACM
14 years 7 months ago
Whirlpool routing for mobility
We present the Whirlpool Routing Protocol (WARP), which efficiently routes data to a node moving within a static mesh. The key insight in WARP's design is that data traffic c...
Jung Woo Lee, Branislav Kusy, Tahir Azim, Basem Sh...
BMCBI
2010
160views more  BMCBI 2010»
14 years 9 months ago
Extracting consistent knowledge from highly inconsistent cancer gene data sources
Background: Hundreds of genes that are causally implicated in oncogenesis have been found and collected in various databases. For efficient application of these abundant but diver...
Xue Gong, Ruihong Wu, Yuannv Zhang, Wenyuan Zhao, ...
96
Voted
ICCCN
2007
IEEE
15 years 3 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
SIGCOMM
2010
ACM
14 years 9 months ago
Mobile data offloading: how much can WiFi deliver?
This is a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from a metropolitan area and collected stat...
Kyunghan Lee, Injong Rhee, Joohyun Lee, Yung Yi, S...