Learn More
The Internet has recently been evolving from homogeneous congestion control to heterogeneous congestion control. Several years ago, Internet traffic was mainly controlled by the traditional RENO, whereas it is now controlled by multiple different TCP algorithms, such as RENO, CUBIC, and Compound TCP (CTCP). However, there is very little work on the(More)
RFID (radio frequency identification) technologies are poised to revolutionize retail, warehouse and supply chain management. One of their interesting applications is to automatically detect missing tags (and the associated objects) in a large storage space. In order to timely catch any missing event such as theft, the detection operation may have to be(More)
The glutathione S-transferases (GSTs) are a family of ubiquitously expressed polymorphic enzymes important for detoxifying endogenous and exogenous compounds. In addition to their classic activity of detoxification by conjugation of compounds with glutathione, many other functions are now found to be associated with GSTs. The associations between GST(More)
—RFID tags have many important applications in automated warehouse management. One example is to monitor a set of tags and detect whether some tags are missing — the objects to which the missing tags are attached are likely to be missing, too, due to theft or administrative error. Prior research on this problem has primarily focused on efficient protocols(More)
—Radio frequency identification (RFID) technology has many applications in inventory management, supply chain, product tracking, transportation and logistics. One research issue of practical importance is to search for a particular group of tags in a large-scale RFID system. Time efficiency is a core factor that must be taken into consideration when(More)
Cross-classified random-effects models (CCREMs) are used for modeling nonhierarchical multilevel data. Misspecifying CCREMs as hierarchical linear models (i.e., treating the cross-classified data as strictly hierarchical by ignoring one of the crossed factors) causes biases in the variance component estimates, which in turn, results in biased estimation in(More)
—Radio Frequency IDentification (RFID) technology has been adopted in many applications, such as inventory control, object tracking, theft prevention, and supply chain management. Privacy-preserving authentication in RFID systems is a very important problem. Existing protocols employ tree structures to achieve fast authentication. We observe that these(More)
A deletion mutation in the growth hormone receptor (GHR) gene results in the inhibition of skeletal muscle growth and fat deposition in dwarf chickens. We used microarray techniques to determine microRNA (miRNA) and mRNA expression profiles of GHR in the skeletal muscles of 14-day-old embryos as well as 7-week-old deletion-type dwarf and normal-type(More)
Keywords: Distributed rate adjustment protocol Multihop wireless networks Max–min fairness a b s t r a c t To promote commercial deployment of multihop wireless networks, the research/industry communities must develop new theories and protocols for flexible traffic engineering in these networks in order to support diverse user applications. This paper(More)
—RFID technology has many applications such as object tracking, automatic inventory control, and supply chain management. They can be used to identify individual objects or count the population of each type of objects in a deployment area, no matter whether the objects are passports, retail products, books or even humans. Most existing work adopts a " flat(More)