Sciweavers

4451 search results - page 853 / 891
» Performance Modeling for Entity-Level Simulations
Sort
View
AHSWN
2006
206views more  AHSWN 2006»
15 years 4 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
BMCBI
2006
155views more  BMCBI 2006»
15 years 4 months ago
CAVER: a new tool to explore routes from protein clefts, pockets and cavities
Background: The main aim of this study was to develop and implement an algorithm for the rapid, accurate and automated identification of paths leading from buried protein clefts, ...
Martin Petrek, Michal Otyepka, Pavel Banás,...
JSAC
2008
146views more  JSAC 2008»
15 years 4 months ago
On the Interaction and Competition among Internet Service Providers
The current Internet architecture comprises of different privately owned Internet service providers (ISPs) where higher tier ISPs supply connectivity service to lower tier ISPs an...
Sam C. M. Lee, John C. S. Lui
JSAC
2007
133views more  JSAC 2007»
15 years 4 months ago
On broadcasting with cooperative diversity in multi-hop wireless networks
Abstract— Cooperative diversity facilitates spatio-temporal communications without requiring the deployment of physical antenna arrays. While physical layer studies on cooperativ...
Gentian Jakllari, Srikanth V. Krishnamurthy, Micha...
144
Voted
COMCOM
2004
112views more  COMCOM 2004»
15 years 4 months ago
Design and analysis of optimal adaptive de-jitter buffers
In order to transfer voice or some other application requiring real-time delivery over a packet network, we need a de-jitter buffer to eliminate delay jitters. An important design...
Gagan L. Choudhury, Robert G. Cole