Sciweavers

450 search results - page 53 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
JMLR
2010
145views more  JMLR 2010»
14 years 4 months ago
Event based text mining for integrated network construction
The scientific literature is a rich and challenging data source for research in systems biology, providing numerous interactions between biological entities. Text mining technique...
Yvan Saeys, Sofie Van Landeghem, Yves Van de Peer
ICC
2009
IEEE
210views Communications» more  ICC 2009»
15 years 4 months ago
Multi-User Joint Subchannel and Power Resource-Allocation for Powerline Relay Networks
Abstract—This paper investigates Orthogonal FrequencyDivision Multiple-Access (OFDMA) resource-allocation schemes for two-hop relays in a home Powerline Communication (PLC) netwo...
Hao Zou, Aakanksha Chowdhery, Sumanth Jagannathan,...
INFOCOM
2009
IEEE
15 years 4 months ago
Medium Access Control for 60 GHz Outdoor Mesh Networks with Highly Directional Links
—We investigate an architecture for multi-Gigabit outdoor mesh networks operating in the unlicensed 60 GHz “millimeter (mm) wave” band. In this band, the use of narrow beams ...
Raghuraman Mudumbai, Sumit Singh, Upamanyu Madhow
CORR
2010
Springer
231views Education» more  CORR 2010»
14 years 7 months ago
Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks
Scheduling is a critical and challenging resource allocation mechanism for multi-hop wireless networks. It is well known that scheduling schemes that give a higher priority to the ...
Bo Ji, Changhee Joo, Ness B. Shroff
TWC
2010
14 years 4 months ago
Clustering and cluster-based routing protocol for delay-tolerant mobile networks
This research investigates distributed clustering scheme and proposes a cluster-based routing protocol for DelayTolerant Mobile Networks (DTMNs). The basic idea is to distributivel...
Ha Dang, Hongyi Wu