Sciweavers

2814 search results - page 175 / 563
» Multicriteria Network Design Using Evolutionary Algorithm
Sort
View
118
Voted
VLDB
2005
ACM
125views Database» more  VLDB 2005»
15 years 9 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
146
Voted
NDSS
2003
IEEE
15 years 9 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
120
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Optimized distributed 2D transforms for irregularly sampled sensor network grids using wavelet lifting
We address the design and optimization of an energy-efficient lifting-based 2D transform for wireless sensor networks with irregular spatial sampling. The 2D transform is designe...
Godwin Shen, Antonio Ortega
143
Voted
PEWASUN
2008
ACM
15 years 5 months ago
Experimentation and performance evaluation of rate adaptation algorithms in wireless mesh networks
In this paper we present an experimental study conducted in 802.11based mesh networks of three existing rate adaptation algorithms. The aim of this study is twofold. On the one ha...
Emilio Ancillotti, Raffaele Bruno, Marco Conti
CN
1998
64views more  CN 1998»
15 years 3 months ago
Decentralized Network Connection Preemption Algorithms
Connection preemption provides available and reliable services to high-priority connections when a network is heavily loaded and connection request arrival patterns are unknown, o...
Mohammad Peyravian, Ajay D. Kshemkalyani