Sciweavers

248 search results - page 46 / 50
» Characterizing a spam traffic
Sort
View
102
Voted
COMCOM
2008
151views more  COMCOM 2008»
14 years 9 months ago
Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links
With the unique features of spatial multiplexing and interference suppression, Multiple Input Multiple Output (MIMO) techniques have great potential in the improvement of network ...
Jun Wang, Peng Du, Weijia Jia, Liusheng Huang, Hua...
CSDA
2006
103views more  CSDA 2006»
14 years 9 months ago
LASS: a tool for the local analysis of self-similarity
The Hurst parameter H characterizes the degree of long-range dependence (and asymptotic selfsimilarity) in stationary time series. Many methods have been developed for the estimat...
Stilian Stoev, Murad S. Taqqu, Cheolwoo Park, Geor...
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CLUSTER
2000
IEEE
14 years 9 months ago
Dynamic Max-Min fairness in ring networks
Ring networks are enjoying renewed interest as Storage Area Networks (SANs), i.e., networks for interconnecting storage devices (e.g., disk, disk arrays and tape drives) and stora...
Giuseppe Anastasi, Luciano Lenzini, M. La Porta, Y...
ICUMT
2009
14 years 7 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...