Sciweavers

799 search results - page 146 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
IPSN
2010
Springer
15 years 4 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...
CDC
2008
IEEE
134views Control Systems» more  CDC 2008»
15 years 4 months ago
Networked control systems with packet delays and losses
— We investigate the effect of packet delays and packet drops on networked control systems. First we consider the problem of where to locate a controller or state estimator in a...
Craig L. Robinson, P. R. Kumar
BMCBI
2008
166views more  BMCBI 2008»
14 years 10 months ago
Learning transcriptional regulatory networks from high throughput gene expression data using continuous three-way mutual informa
Background: Probability based statistical learning methods such as mutual information and Bayesian networks have emerged as a major category of tools for reverse engineering mecha...
Weijun Luo, Kurt D. Hankenson, Peter J. Woolf
PR
2006
78views more  PR 2006»
14 years 9 months ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...
GLOBECOM
2008
IEEE
15 years 4 months ago
Collaborative Opportunistic Spectrum Access in the Presence of Multiple Transmitters
Abstract— We present a collaborative algorithm to enable opportunistic spectrum access for cognitive radios in the presence of multiple co-channel transmitters. A spectrum hole d...
Ahmed O. Nasif, Brian L. Mark