Sciweavers

7544 search results - page 191 / 1509
» Network Forensics Analysis
Sort
View
143
Voted
CORR
2011
Springer
206views Education» more  CORR 2011»
14 years 7 months ago
Modeling and Analysis of K-Tier Downlink Heterogeneous Cellular Networks
Cellular networks are in a major transition from a carefully planned set of large tower-mounted basestations (BSs) to an irregular deployment of heterogeneous infrastructure eleme...
Harpreet S. Dhillon, Radha Krishna Ganti, Fran&cce...
137
Voted
ICC
2009
IEEE
15 years 10 months ago
Random Linear Network Coding for Time Division Duplexing: Energy Analysis
—We study the energy performance of random linear network coding for time division duplexing channels. We assume a packet erasure channel with nodes that cannot transmit and rece...
Daniel Enrique Lucani, Milica Stojanovic, Muriel M...
128
Voted
ICPR
2008
IEEE
15 years 10 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
135
Voted
ISCC
2008
IEEE
148views Communications» more  ISCC 2008»
15 years 10 months ago
Data collection in sensor networks with data mules: An integrated simulation analysis
Wireless sensor networks (WSNs) have emerged as the enabling technology for a wide range of applications. In the context of environmental monitoring, especially in urban scenarios...
Giuseppe Anastasi, Marco Conti, Mario Di Francesco
147
Voted
AVSS
2007
IEEE
15 years 10 months ago
Model-based human posture estimation for gesture analysis in an opportunistic fusion smart camera network
In multi-camera networks rich visual data is provided both spatially and temporally. In this paper a method of human posture estimation is described incorporating the concept of a...
Chen Wu, Hamid K. Aghajan