Sciweavers

5516 search results - page 1038 / 1104
» A Topological Approach to Recognition
Sort
View
CGF
2010
146views more  CGF 2010»
14 years 10 months ago
Pathline: A Tool For Comparative Functional Genomics
Biologists pioneering the new field of comparative functional genomics attempt to infer the mechanisms of gene regulation by looking for similarities and differences of gene activ...
Miriah D. Meyer, Bang Wong, Mark P. Styczynski, Ta...
CN
2008
128views more  CN 2008»
14 years 10 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
CORR
2010
Springer
160views Education» more  CORR 2010»
14 years 10 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
CORR
2008
Springer
147views Education» more  CORR 2008»
14 years 10 months ago
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
We consider a two-hop wireless network where a transmitter communicates with a receiver via M relays with an amplify-and-forward (AF) protocol. Recent works have shown that sophis...
Mari Kobayashi, Xavier Mestre
CN
2006
84views more  CN 2006»
14 years 9 months ago
Distributed mechanism in detecting and defending against the low-rate TCP attack
In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it ...
Haibin Sun, John C. S. Lui, David K. Y. Yau
« Prev « First page 1038 / 1104 Last » Next »