Sciweavers

4761 search results - page 948 / 953
» Performance of Protocols
Sort
View
CN
2010
130views more  CN 2010»
14 years 7 months ago
CoreCast: How core/edge separation can help improving inter-domain live streaming
The rapid growth of broadband access has popularized multimedia services, which nowadays contribute to a large part of Internet traffic. Among this content, the broadcasting of li...
Loránd Jakab, Albert Cabellos-Aparicio, Tho...
INFOCOM
2010
IEEE
14 years 6 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
CCS
2010
ACM
14 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
106
Voted
BMCBI
2011
14 years 4 months ago
GCOD - GeneChip Oncology Database
Background: DNA microarrays have become a nearly ubiquitous tool for the study of human disease, and nowhere is this more true than in cancer. With hundreds of studies and thousan...
Fenglong Liu, Joseph White, Corina Antonescu, John...
BMCBI
2011
14 years 4 months ago
Identifying hypermethylated CpG islands using a quantile regression model
Background: DNA methylation has been shown to play an important role in the silencing of tumor suppressor genes in various tumor types. In order to have a system-wide understandin...
Shuying Sun, Zhengyi Chen, Pearlly Yan, Yi-Wen Hua...