Sciweavers

634 search results - page 102 / 127
» Some observations on bitTorrent performance
Sort
View
ICDCS
1995
IEEE
15 years 3 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
BMCBI
2007
139views more  BMCBI 2007»
14 years 12 months ago
Improving model predictions for RNA interference activities that use support vector machine regression by combining and filterin
Background: RNA interference (RNAi) is a naturally occurring phenomenon that results in the suppression of a target RNA sequence utilizing a variety of possible methods and pathwa...
Andrew S. Peek
BMCBI
2006
129views more  BMCBI 2006»
14 years 12 months ago
Improved alignment quality by combining evolutionary information, predicted secondary structure and self-organizing maps
Background: Protein sequence alignment is one of the basic tools in bioinformatics. Correct alignments are required for a range of tasks including the derivation of phylogenetic t...
Tomas Ohlson, Varun Aggarwal, Arne Elofsson, Rober...
INFOCOM
2010
IEEE
14 years 10 months ago
Network Coding Tomography for Network Failures
—Network Tomography (or network monitoring) uses end-to-end path-level measurements to characterize the network, such as topology estimation and failure detection. This work prov...
Hongyi Yao, Sidharth Jaggi, Minghua Chen
ACSAC
2010
IEEE
14 years 9 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu