Sciweavers

933 search results - page 139 / 187
» Centrality Estimation in Large Networks
Sort
View
JSAC
2010
142views more  JSAC 2010»
14 years 8 months ago
Extreme value FEC for reliable broadcasting in wireless networks
—The advent of practical rateless codes enables implementation of highly efficient packet-level forward error correction (FEC) strategies for reliable data broadcasting in loss-...
Weiyao Xiao, David Starobinski
SIAMSC
2008
126views more  SIAMSC 2008»
14 years 9 months ago
Towards a Statistical Theory of Texture Evolution in Polycrystals
Abstract. Most technologically useful materials possess polycrystalline microstructures composed of a large number of small monocrystalline grains separated by grain boundaries. Th...
K. Barmak, M. Emelianenko, Dmitry Golovaty, David ...
IWIA
2005
IEEE
15 years 3 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
MATA
2001
Springer
177views Communications» more  MATA 2001»
15 years 2 months ago
A Self-adaptable Agent System for Efficient Information Gathering
As networks become all-pervasive the importance of efficient information gathering for purposes such as monitoring, fault diagnosis, and performance evaluation can only increase. E...
Antonio Liotta, George Pavlou, Graham Knight
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 4 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque