Learn More
We have utilized computational biology to screen GenBank for the presence of recently integrated Ya5 and Yb8 Alu family members. Our analysis identified 2640 Ya5 Alu family members and 1852 Yb8 Alu family members from the draft sequence of the human genome. We selected a set of 475 of these elements for detailed analyses. Analysis of the DNA sequences from(More)
1. CONTEXT AND MOTIVATION Enabling content sharing among mobile users is a promising application for opportunistic networks. Clearly, collo-cated people are likely to share mutual interests. In this context, disseminating contents through opportunistic communications could be more efficient than passing through central servers. We implemented PACS(More)
Achieving efficient content dissemination in mobile opportunistic networks becomes a big challenge when content sizes are large and require more capacity than what contact opportunities between nodes may offer. Content fragmentation solves only part of the problem, as nodes still need to decide which fragment to send when a contact happens. To address this(More)
Existing measurement techniques for IEEE~802.11-based networks assume that the higher the density of monitors in the target area, the higher the quality of the measure. This assumption is, however, too strict if we consider the cost involved in monitor installation and the necessary time to collect and merge all traces. In this paper, we investigate the(More)
Best-performing WLAN monitoring systems must capture as much wireless traffic as possible. To achieve this aim, several monitors are employed to capture wireless exchanges in a target area. Monitors potentially generate large traces that are all merged together to have a more complete, global view of the network behavior. Traces are often more equal than(More)
In the Internet, user-level performance of P2P applications may be determined by the interaction of two independent dynamics: on the one hand, by the end-to-end control policies applied at the P2P application layer (L7); on the other hand, by Traffic Engineering (TE) decisions taken at the network level (L3). Currently available tools do not allow to study(More)
Disseminating large files in opportunistic networks requires splitting the content into smaller pieces in order to leverage short contacts between nodes on the move. A negative consequence of content chopping is that it may generate significant overhead, as nodes have to exchange more signaling information to determine which pieces the neighbor misses. In(More)
Over the latest few years, we have witnessed the widespread diffusion of smartphones, tablets, and other mobile devices with diverse networking and multimedia capabilities. Major operators in the US and Europe are experiencing severe problems in coping with the mobile data traffic generated by their users. The main reason is that the trend of traffic demand(More)
The authors report on the pharmacological employment of defibrotide in the treatment of a case of deep vein thrombosis (DVT) of the left iliac-femoral veins in a patient with a high-risk of hemorrhage (haematuria from kidney neoplasm, rupture of basilar artery aneurysm, urethral bleeding from catheter trauma). Alternatively to the traditional thrombolytic(More)