Sciweavers

1080 search results - page 98 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
BMCBI
2006
126views more  BMCBI 2006»
14 years 10 months ago
OpWise: Operons aid the identification of differentially expressed genes in bacterial microarray experiments
Background: Differentially expressed genes are typically identified by analyzing the variation between replicate measurements. These procedures implicitly assume that there are no...
Morgan N. Price, Adam P. Arkin, Eric J. Alm
PAMI
2000
142views more  PAMI 2000»
14 years 9 months ago
Evolutionary Pursuit and Its Application to Face Recognition
Abstract-- This paper introduces Evolutionary Pursuit (EP) as a novel and adaptive representation method for image encoding and classification. In analogy to projection pursuit met...
Chengjun Liu, Harry Wechsler
CORR
2007
Springer
114views Education» more  CORR 2007»
14 years 10 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...
CCS
2007
ACM
15 years 4 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
JSAC
2008
121views more  JSAC 2008»
14 years 10 months ago
Stochastic analysis of network coding in epidemic routing
Epidemic routing has been proposed to reduce the data transmission delay in disruption tolerant wireless networks, in which data can be replicated along multiple opportunistic path...
Yunfeng Lin, Baochun Li, Ben Liang