David Wang

Results: 192



#Item
1Internet architecture / Computing / Network architecture / Internet / Quality of service / Teletraffic / Resource Reservation Protocol / Network protocols / Integrated services / Mobile IP / Handover / RSVP

Evaluation of RSVP and Mobility-aware RSVP Using Performance Evaluation Process Algebra Hao Wang and David I. Laurenson Jane Hillston

Add to Reading List

Source URL: www.dcs.ed.ac.uk

Language: English - Date: 2008-03-05 10:22:30
2

Genotype Sequence Segmentation: Handling Constraints and Noise Qi Zhang, Wei Wang, Leonard McMillan, Jan Prins Fernando Pardo-Manuel de Villena, David Threadgill UNC Chapel Hill

Add to Reading List

Source URL: web.cs.ucla.edu

Language: English - Date: 2008-07-11 22:03:33
    3

    Inferring novel associations between SNP sets and gene sets in eQTL study using sparse graphical model Wei Cheng 1 , Xiang Zhang 2 , Yubao Wu 2 , Xiaolin Yin 2 , Jing Li 2 , David Heckerman 3 , and Wei Wang 4 1

    Add to Reading List

    Source URL: web.cs.ucla.edu

    Language: English - Date: 2012-11-30 15:10:44
      4

      Quantitative Association Analysis Using Tree Hierarchies Feng Pan 1 , Lynda Yang 1 , Leonard McMillan 1 , Fernando Pardo Manuel de Villena 2 , David Threadgill 2 and Wei Wang 1 1 Department of Computer Science, 2 Departm

      Add to Reading List

      Source URL: web.cs.ucla.edu

      Language: English - Date: 2008-12-26 20:05:28
        5

        Quantitative Association Analysis Using Tree Hierarchies Feng Pan 1 , Lynda Yang 1 , Leonard McMillan 1 , Fernando Pardo Manuel de Villena 2 , David Threadgill 2 and Wei Wang 1 1 Department of Computer Science, 2 Departm

        Add to Reading List

        Source URL: www.cs.unc.edu

        Language: English - Date: 2008-12-26 20:05:28
          6Cryptography / Cryptographic software / Cryptographic protocols / Transport Layer Security / Secure communication / Cryptographic primitive / Cryptographic engineering / OpenSSL / Cryptographic hash function / Padding oracle attack / Man-in-the-middle attack / Cryptographically secure pseudorandom number generator

          Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

          Add to Reading List

          Source URL: people.csail.mit.edu

          Language: English
          7

          Mixed-Signal Stochastic Computation Demonstrated in an Image Sensor with Integrated 2D Edge Detection and Noise Filtering David Fick, Gyouho Kim, Allan Wang, David Blaauw, Dennis Sylvester University of Michigan, Ann Arb

          Add to Reading List

          Source URL: blaauw.engin.umich.edu

          Language: English - Date: 2017-11-16 10:05:35
            8

            Tracking Certificate Misissuance in the Wild Deepak Kumar∗ , Zhengping Wang∗ , Matthew Hyder∗ , Joseph Dickinson∗ , Gabrielle Beck† , David Adrian† , Joshua Mason∗ , Zakir Durumeric∗†‡ , J. Alex Halde

            Add to Reading List

            Source URL: joshm.web.engr.illinois.edu

            Language: English - Date: 2018-01-08 17:29:16
              9

              Formal Veri cation of UML Statecharts with Real-Time Extensions? Alexandre David , M. Oliver Moller , and Wang Yi 1 2

              Add to Reading List

              Source URL: www.it.uu.se

              Language: English - Date: 2002-05-14 03:19:47
                10

                Experience Report: An Industrial Experience Report on Test Outsourcing Practices Xin Xia∗ , David Lo† , Pavneet Singh Kochhar† , Zhenchang Xing‡ , Xinyu Wang∗\ , and Shanping Li∗ ∗ College of Computer Scie

                Add to Reading List

                Source URL: soarsmu.github.io

                Language: English - Date: 2016-07-17 08:44:52
                  UPDATE