Sciweavers

1953 search results - page 355 / 391
» codes 2010
Sort
View
TON
2010
189views more  TON 2010»
14 years 4 months ago
Analysis, Simulation, and Implementation of VCP: A Wireless Profiling
Abstract--Every congestion control protocol operating in wireless networks is potentially faced with two major challenges of performance degradation. These sources are (a) the coup...
Xiaolong Li, Homayoun Yousefi'zadeh
75
Voted
NAR
2011
256views Computer Vision» more  NAR 2011»
14 years 16 days ago
COSMIC: mining complete cancer genomes in the Catalogue of Somatic Mutations in Cancer
COSMIC (http://www.sanger.ac.uk/cosmic) curates comprehensive information on somatic mutations in human cancer. Release v48 (July 2010) describes over 136 000 coding mutations in ...
Simon A. Forbes, Nidhi Bindal, Sally Bamford, Char...
IEEEARES
2010
IEEE
15 years 3 months ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
CLOUD
2010
ACM
15 years 2 months ago
RACS: a case for cloud storage diversity
The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud. However, success for cloud storage pr...
Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weath...
73
Voted
CONCUR
2010
Springer
14 years 10 months ago
Simulation Distances
Boolean notions of correctness are formalized by preorders on systems. Quantitative measures of correctness can be formalized by realvalued distance functions between systems, wher...
Pavol Cerný, Thomas A. Henzinger, Arjun Rad...