Sciweavers

4757 search results - page 739 / 952
» Generalized Posynomial Performance Modeling
Sort
View
120
Voted
AHSWN
2006
206views more  AHSWN 2006»
15 years 24 days ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
BMCBI
2006
165views more  BMCBI 2006»
15 years 24 days ago
A stable gene selection in microarray data analysis
Background: Microarray data analysis is notorious for involving a huge number of genes compared to a relatively small number of samples. Gene selection is to detect the most signi...
Kun Yang, Zhipeng Cai, Jianzhong Li, Guohui Lin
117
Voted
MOBIHOC
2009
ACM
16 years 1 months ago
Aging rules: what does the past tell about the future in mobile ad-hoc networks?
The study in mobile ad-hoc networks (MANET) is facing challenges brought by recent discovery of non-exponential behavior of the inter-contact time distribution of mobile nodes. In...
Han Cai, Do Young Eun
70
Voted
STOC
2004
ACM
61views Algorithms» more  STOC 2004»
16 years 1 months ago
The zero-one principle for switching networks
Recently, approximation analysis has been extensively used to study algorithms for routing weighted packets in various network settings. Although different techniques were applied...
Yossi Azar, Yossi Richter
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
16 years 29 days ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...