Sciweavers

1080 search results - page 58 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
BMCBI
2005
122views more  BMCBI 2005»
14 years 10 months ago
Computational verification of protein-protein interactions by orthologous co-expression
Background: High-throughput methods identify an overwhelming number of protein-protein interactions. However, the limited accuracy of these methods results in the false identifica...
Itay Tirosh, Naama Barkai
PDP
2006
IEEE
15 years 4 months ago
A Hierarchical Consensus Protocol for Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) raise new challenges in designing protocols for solving the consensus problem. Among the others, how to design message efficient protocols so as to...
Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal
MA
2000
Springer
134views Communications» more  MA 2000»
15 years 1 months ago
A Reliable Message Delivery Protocol for Mobile Agents
The abstractions and protocol mechanisms that form the basis for inter-agent communications can significantly impact the overall design and effectiveness of Mobile Agent systems. W...
Mudumbai Ranganathan, Marc Bednarek, Doug Montgome...
SIMUTOOLS
2008
14 years 11 months ago
Implementing MAC protocols for cooperative relaying: a compiler-assisted approach
Evaluating the performance of a cooperative relaying protocol requires an implementation for simulators and/or software-defined radios (SDRs) with an appropriate model for error d...
Hermann S. Lichte, Stefan Valentin
MASCOTS
2007
14 years 11 months ago
Analysis of Core-Assisted Routing in Opportunistic Networks
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...
Muhammad Abdulla, Robert Simon