Sciweavers

5114 search results - page 243 / 1023
» Complex networks
Sort
View
TSMC
2008
172views more  TSMC 2008»
15 years 20 days ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
120
Voted
VTC
2010
IEEE
147views Communications» more  VTC 2010»
14 years 11 months ago
Generalized Proportionally Fair Scheduling for Multi-User Amplify-and-Forward Relay Networks
—Providing ubiquitous very high data rate coverage in next generation wireless networks is a formidable goal, requiring cost-effective radio access network (RAN) devices, such as...
Alireza Sharifian, Petar Djukic, Halim Yanikomerog...
WICSA
2004
15 years 2 months ago
The DiPS+ Software Architecture for Self-healing Protocol Stacks
Research domains such as active networks, ad-hoc networks, ubiquitous computing, pervasive computing, grid computing, and sensor networks, clearly show that computer networks will...
Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre...
93
Voted
CCR
2006
76views more  CCR 2006»
15 years 25 days ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
CCR
2010
184views more  CCR 2010»
15 years 27 days ago
Characterising temporal distance and reachability in mobile and online social networks
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...