Sciweavers

1080 search results - page 200 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
BMCBI
2010
116views more  BMCBI 2010»
14 years 9 months ago
permGPU: Using graphics processing units in RNA microarray association studies
Background: Many analyses of microarray association studies involve permutation, bootstrap resampling and crossvalidation, that are ideally formulated as embarrassingly parallel c...
Ivo D. Shterev, Sin-Ho Jung, Stephen L. George, Ko...
BMCBI
2007
102views more  BMCBI 2007»
14 years 9 months ago
A comprehensive system for evaluation of remote sequence similarity detection
Background: Accurate and sensitive performance evaluation is crucial for both effective development of better structure prediction methods based on sequence similarity, and for th...
Yuan Qi, Ruslan Sadreyev, Yong Wang, Bong-Hyun Kim...
TMC
2008
109views more  TMC 2008»
14 years 9 months ago
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks
Key predistribution has been claimed to be the only viable approach for establishing shared keys between neighboring sensors after deployment for a typical sensor network. However,...
Fang Liu, Xiuzhen Cheng, Liran Ma, Kai Xing
TASE
2010
IEEE
14 years 4 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
INFOCOM
2011
IEEE
14 years 1 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang