Sciweavers

6666 search results - page 358 / 1334
» Reconfigurable Computing for High Performance Networking App...
Sort
View
BMCBI
2008
151views more  BMCBI 2008»
15 years 4 months ago
Application of the Linux cluster for exhaustive window haplotype analysis using the FBAT and Unphased programs
Background: Genetic association studies have been used to map disease-causing genes. A newly introduced statistical method, called exhaustive haplotype association study, analyzes...
Hiroyuki Mishima, Andrew C. Lidral, Jun Ni
IWCMC
2010
ACM
15 years 9 months ago
Dividing sensitive ranges based mobility prediction algorithm in wireless networks
As wireless networks have been widely deployed for public mobile services, predicting the location of a mobile user in wireless networks became an interesting and challenging prob...
Yuliang Tang, Der-Jiunn Deng, Yannan Yuan, Chun-Ch...
MINENET
2005
ACM
15 years 9 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
TIP
2008
199views more  TIP 2008»
15 years 4 months ago
Minimal-Bracketing Sets for High-Dynamic-Range Image Capture
Abstract--This paper considers the problem of high-dynamicrange (HDR) image capture using low-dynamic-range (LDR) cameras. We present three different minimal-bracketing algorithms ...
Neil Barakat, A. Nicholas Hone, Thomas E. Darcie
ISF
2008
114views more  ISF 2008»
15 years 4 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan