Sciweavers

248 search results - page 36 / 50
» Characterizing a spam traffic
Sort
View
COMCOM
2008
92views more  COMCOM 2008»
14 years 9 months ago
Can the current generation of wireless mesh networks compete with cellular voice?
Wireless mesh networks are being deployed to provide broadband wireless connectivity to city-wide hotspots. The typical architecture in these deployments thus far is a single-radi...
Andres Arjona, Cédric Westphal, Jukka Manne...
EOR
2008
119views more  EOR 2008»
14 years 9 months ago
Market sharing dynamics between two service providers
We study the market partition between two distinct firms that deliver services to waiting time sensitive customers. In our model, the incoming customers select a firm on the basis...
Olivier Gallay, Max-Olivier Hongler
TSP
2008
145views more  TSP 2008»
14 years 9 months ago
Multichannel ALLIANCES: A Cooperative Cross-Layer Scheme for Wireless Networks
A random access protocol named ALLIANCES was recently proposed, that achieves high throughput by resolving collisions in wireless networks. ALLIANCES exploits diversity provided b...
Lun Dong, Athina P. Petropulu
SAC
2008
ACM
14 years 9 months ago
Large-scale simulation of V2V environments
Providing vehicles with enhanced ability to communicate and exchange real-time data with neighboring vehicles opens up a variety of complex challenges that can only be met by comb...
Hugo Conceição, Luís Damas, M...
IMC
2010
ACM
14 years 7 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...