Sciweavers

1473 search results - page 284 / 295
» On Performance Modeling of Ad Hoc Routing Protocols
Sort
View
112
Voted
KBSE
2005
IEEE
15 years 5 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
MOBICOM
2004
ACM
15 years 5 months ago
Analyzing the spread of active worms over VANET
Interactive communications among nodes in Vehicular Ad Hoc Networks (VANET) and the safety-oriented nature of many VANET applications necessitate a robust security framework. An a...
Syed A. Khayam, Hayder Radha
80
Voted
ICIP
2004
IEEE
16 years 1 months ago
Rate-distortion analysis of random access for compressed light fields
Image-based rendering data sets, such as light fields, require efficient compression due to their large data size, but also easy random access when rendering from the data set. Ef...
Prashant Ramanathan, Bernd Girod
80
Voted
DSRT
2006
IEEE
15 years 5 months ago
EGRESS: Environment for Generating REalistic Scenarios for Simulations
In MANETs, majority of performance studies are carried out via simulations, where node mobility and radio propagation models play a crucial role. However, popular simulation tools...
K. N. Sridhar, Shuai Hao, Mun Choon Chan, Akkihebb...
CLEF
2007
Springer
15 years 6 months ago
Amharic-English Information Retrieval with Pseudo Relevance Feedback
We describe cross language retrieval experiments using Amharic queries and English language document collection from our participation in the bilingual ad hoc track at the CLEF 20...
Atelach Alemu Argaw