Sciweavers

8135 search results - page 1564 / 1627
» networking 2008
Sort
View
111
Voted
BMCBI
2008
140views more  BMCBI 2008»
15 years 20 days ago
GORouter: an RDF model for providing semantic query and inference services for Gene Ontology and its associations
Background: The most renowned biological ontology, Gene Ontology (GO) is widely used for annotations of genes and gene products of different organisms. However, there are shortcom...
Qingwei Xu, Yixiang Shi, Qiang Lu, Guo-qing Zhang,...
111
Voted
BMCBI
2008
100views more  BMCBI 2008»
15 years 20 days ago
Hotspot Hunter: a computational system for large-scale screening and selection of candidate immunological hotspots in pathogen p
Background: T-cell epitopes that promiscuously bind to multiple alleles of a human leukocyte antigen (HLA) supertype are prime targets for development of vaccines and immunotherap...
Guanglan Zhang, Asif M. Khan, Kellathur N. Sriniva...
CE
2008
122views more  CE 2008»
15 years 20 days ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
112
Voted
CN
2008
85views more  CN 2008»
15 years 20 days ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...
118
Voted
CN
2008
84views more  CN 2008»
15 years 20 days ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
« Prev « First page 1564 / 1627 Last » Next »