Sciweavers

907 search results - page 93 / 182
» A Comparison of Genetic Network Models
Sort
View
ICNP
2002
IEEE
15 years 2 months ago
Attacking DDoS at the Source
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects an...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
SDM
2009
SIAM
204views Data Mining» more  SDM 2009»
15 years 7 months ago
Application of Bayesian Partition Models in Warranty Data Analysis.
Automotive companies are forced to continuously extend and improve their product line-up. However, increasing diversity, higher design complexity, and shorter development cycles c...
Axel Blumenstock, Christoph Schlieder, Markus M&uu...
EJWCN
2010
156views more  EJWCN 2010»
14 years 4 months ago
On Performance Modeling of Ad Hoc Routing Protocols
Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermo...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
HICSS
2005
IEEE
165views Biometrics» more  HICSS 2005»
15 years 3 months ago
A QoS Based Model for Supporting Multimedia Applications over Cellular IP
With the increasing use of real-time multimedia applications over IP networks, efficient use of resources, especially in wireless networks, is becoming a necessity. In order to ha...
Elwalid Sidahmed, Hesham H. Ali
IJCNN
2006
IEEE
15 years 4 months ago
Rao-Blackwellized Particle Filtering for Sequential Speech Enhancement
— In this paper we present a method of sequential speech enhancement, where we infer clean speech signal using a Rao-Blackwellized particle filter (RBPF), given a noisecontamina...
Sunho Park, Seungjin Choi