Sciweavers

1302 search results - page 251 / 261
» From Liveness to Promptness
Sort
View
CCR
2008
109views more  CCR 2008»
15 years 17 days ago
An independent H-TCP implementation under FreeBSD 7.0: description and observed behaviour
A key requirement for IETF recognition of new TCP algorithms is having an independent, interoperable implementation. This paper describes our BSD-licensed implementation of H-TCP ...
Grenville J. Armitage, Lawrence Stewart, Michael W...
123
Voted
COMPSEC
2010
146views more  COMPSEC 2010»
15 years 17 days ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
75
Voted
DB
2008
73views more  DB 2008»
15 years 16 days ago
Environmental influences on gender in the IT workforce
In an effort to better understand the underrepresentation of women within the IT profession, one promising line of investigation is the influence of factors in the socio-cultural ...
Eileen M. Trauth, Jeria L. Quesenberry, Benjamin Y...
104
Voted
BMCBI
2006
113views more  BMCBI 2006»
15 years 15 days ago
GibbsST: a Gibbs sampling method for motif discovery with enhanced resistance to local optima
Background: Computational discovery of transcription factor binding sites (TFBS) is a challenging but important problem of bioinformatics. In this study, improvement of a Gibbs sa...
Kazuhito Shida
CSCW
2006
ACM
15 years 14 days ago
Scientific Data Collections and Distributed Collective Practice
As the basic sciences become increasingly information-intensive, the management and use of research data presents new challenges in the collective activities that constitute schola...
Melissa H. Cragin, Kalpana Shankar