Sciweavers

5234 search results - page 835 / 1047
» Simulation of Computer Network Attacks
Sort
View
CF
2010
ACM
15 years 9 months ago
On-chip communication and synchronization mechanisms with cache-integrated network interfaces
Per-core local (scratchpad) memories allow direct inter-core communication, with latency and energy advantages over coherent cache-based communication, especially as CMP architect...
Stamatis G. Kavadias, Manolis Katevenis, Michail Z...
GLOBECOM
2009
IEEE
15 years 8 months ago
Coexistence Problem in IEEE 802.22 Wireless Regional Area Networks
IEEE 802.22 wireless regional area network (WRAN) is an emerging cognitive radio-based system. One of the major challenges for WRANs is how to efficiently schedule both channel sen...
Raed T. Al-Zubi, Mohammad Z. Siam, Marwan Krunz
BMCBI
2008
98views more  BMCBI 2008»
15 years 4 months ago
GBNet: Deciphering regulatory rules in the co-regulated genes using a Gibbs sampler enhanced Bayesian network approach
Background: Combinatorial regulation of transcription factors (TFs) is important in determining the complex gene expression patterns particularly in higher organisms. Deciphering ...
Li Shen, Jie Liu, Wei Wang
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
15 years 4 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
TIT
2008
83views more  TIT 2008»
15 years 4 months ago
Constrained Codes as Networks of Relations
We address the well-known problem of determining the capacity of constrained coding systems. While the onedimensional case is well understood to the extent that there are technique...
Moshe Schwartz, Jehoshua Bruck