Sciweavers

1080 search results - page 214 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
BMCBI
2008
106views more  BMCBI 2008»
14 years 9 months ago
An Integrated Korean Biodiversity and Genetic Information Retrieval System
Background: On-line biodiversity information databases are growing quickly and being integrated into general bioinformatics systems due to the advances of fast gene sequencing tec...
Jeongheui Lim, Jong Bhak, Hee-Mock Oh, Chang-Bae K...
BMCBI
2006
88views more  BMCBI 2006»
14 years 9 months ago
Effect of various normalization methods on Applied Biosystems expression array system data
Background: DNA microarray technology provides a powerful tool for characterizing gene expression on a genome scale. While the technology has been widely used in discovery-based m...
Catalin C. Barbacioru, Yulei Wang, Roger D. Canale...
CN
2007
117views more  CN 2007»
14 years 9 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
87
Voted
CN
2007
117views more  CN 2007»
14 years 9 months ago
Cellular universal IP for nested network mobility
In recent years, network mobility (NEMO) has been studied extensively due to its potential applications in military and public transportation. NEMO basic support protocol (NBSP), ...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin