Sciweavers

4303 search results - page 816 / 861
» Are We There Yet
Sort
View
132
Voted
TWC
2008
150views more  TWC 2008»
15 years 21 days ago
A Unified Cross-Layer Framework for Resource Allocation in Cooperative Networks
Node cooperation is an emerging and powerful solution that can overcome the limitation of wireless systems as well as improve the capacity of the next generation wireless networks....
Wei Chen, Lin Dai, Khaled Ben Letaief, Zhigang Cao
DASFAA
2010
IEEE
225views Database» more  DASFAA 2010»
15 years 1 months ago
Mining Regular Patterns in Data Streams
Discovering interesting patterns from high-speed data streams is a challenging problem in data mining. Recently, the support metric-based frequent pattern mining from data stream h...
Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed,...
105
Voted
BMCBI
2008
120views more  BMCBI 2008»
15 years 28 days ago
A protein interaction based model for schizophrenia study
Background: Schizophrenia is a complex disease with multiple factors contributing to its pathogenesis. In addition to environmental factors, genetic factors may also increase susc...
Pei-Chun Hsu, Ueng-Cheng Yang, Kuan-Hui Shih, Chih...
92
Voted
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 7 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
AIS
2006
Springer
15 years 27 days ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak