Sciweavers

10909 search results - page 1981 / 2182
» Evaluating Backup Algorithms
Sort
View
TMC
2008
91views more  TMC 2008»
15 years 4 months ago
Efficient and Resilient Backbones for Multihop Wireless Networks
We consider the problem of finding "backbones" in multihop wireless networks. The backbone provides end-toend connectivity, allowing non-backbone nodes to save energy sin...
Seungjoon Lee, Bobby Bhattacharjee, Aravind Sriniv...
TSMC
2008
100views more  TSMC 2008»
15 years 4 months ago
Instruction-Matrix-Based Genetic Programming
In genetic programming (GP), evolving tree nodes separately would reduce the huge solution space. However, tree nodes are highly interdependent with respect to their fitness. In th...
Gang Li, Jin Feng Wang, Kin-Hong Lee, Kwong-Sak Le...
140
Voted
JSAC
2007
97views more  JSAC 2007»
15 years 4 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
JSS
2007
121views more  JSS 2007»
15 years 4 months ago
SEAL: A secure communication library for building dynamic group key agreement applications
We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms ...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
138
Voted
BMCBI
2004
104views more  BMCBI 2004»
15 years 4 months ago
Discriminative topological features reveal biological network mechanisms
Background: Recent genomic and bioinformatic advances have motivated the development of numerous network models intending to describe graphs of biological, technological, and soci...
Manuel Middendorf, Etay Ziv, Carter Adams, Jen Hom...
« Prev « First page 1981 / 2182 Last » Next »