Sciweavers

436 search results - page 26 / 88
» On two variations of identifying codes
Sort
View

Publication
167views
14 years 10 months ago
A Network Coding Approach to IP Traceback
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these packets traversed. This is useful for tracing the sources of high volume traffic, e...
Pegah Sattari, Minas Gjoka, Athina Markopoulou
CSMR
2007
IEEE
15 years 4 months ago
An approach for mining services in database oriented applications
The diffusion of service oriented architectures is slowed down by the lack of enough services available for satisfying service integrator needs. Nevertheless, many features desire...
Concettina Del Grosso, Massimiliano Di Penta, Igna...
BMCBI
2010
149views more  BMCBI 2010»
14 years 10 months ago
A multifactorial analysis of obesity as CVD risk factor: Use of neural network based methods in a nutrigenetics context
Background: Obesity is a multifactorial trait, which comprises an independent risk factor for cardiovascular disease (CVD). The aim of the current work is to study the complex eti...
Ioannis K. Valavanis, Stavroula G. Mougiakakou, Ke...
NAR
2006
96views more  NAR 2006»
14 years 9 months ago
mtDB: Human Mitochondrial Genome Database, a resource for population genetics and medical sciences
The mitochondrial genome, contained in the subcellular mitochondrial network, encodes a small number of peptides pivotal for cellular energy production. Mitochondrialgenesarehighl...
Max Ingman, Ulf Gyllensten
ISCC
2003
IEEE
15 years 3 months ago
Optical CDMA Random Access Protocols
Abstract—The link layer of an optical direct-detection code-division multiple-access (CDMA) packet network is considered. Two different protocols that need pretransmission coordi...
Hossam M. H. Shalaby