Sciweavers

7544 search results - page 85 / 1509
» Network Forensics Analysis
Sort
View
DMIN
2006
105views Data Mining» more  DMIN 2006»
14 years 11 months ago
Structural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
Nasrullah Memon, Henrik Legind Larsen
WCNC
2010
IEEE
15 years 1 months ago
Throughput Analysis for Cooperation in Random Access Networks
—This paper aims at answering the questions of how to enable cooperative communications in random access networks. And, since cooperation introduces extra transmissions in the ch...
Amr El-Sherif, K. J. Ray Liu
FCS
2009
14 years 7 months ago
Spectral Analysis of Attractors in Random Boolean Network Models
Circuits and loops in graph systems can be used to model the attractors in gene-regulatory networks. The number of such attractors grows very rapidly with network size and even fo...
Kenneth A. Hawick
MOBICOM
2006
ACM
15 years 3 months ago
Deployment analysis in underwater acoustic wireless sensor networks
In this paper, different deployment strategies for two-dimensional and three-dimensional communication architectures for UnderWater Acoustic Sensor Networks (UW-ASNs) are proposed...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
ISCAS
2003
IEEE
110views Hardware» more  ISCAS 2003»
15 years 3 months ago
Interconnect modeling and sensitivity analysis using adjoint networks reduction technique
An efficient model-order reduction technique for general RLC networks is proposed. The method is extended from the previous projection-base moment matching method with considerin...
Herng-Jer Lee, Chia-Chi Chu, Wu-Shiung Feng