Sciweavers

1076 search results - page 180 / 216
» Optimization Models for Streaming in Multihop Wireless Netwo...
Sort
View
155
Voted
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 4 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
151
Voted
DMSN
2007
ACM
15 years 8 months ago
Declarative temporal data models for sensor-driven query processing
Many sensor network applications monitor continuous phenomena by sampling, and fit time-varying models that capture the phenomena's behaviors. We introduce Pulse, a framework...
Yanif Ahmad, Ugur Çetintemel
233
Voted
ICC
2007
IEEE
288views Communications» more  ICC 2007»
15 years 10 months ago
Joint Channel State Based Random Access and Adaptive Modulation in Wireless LAN with Multi-Packet Reception
—Conventional 802.11 medium access control (MAC) characteristics. In particular, all of these designs adopted a protocols have been designed separately from the characteristics s...
Wei Lan Huang, Khaled Ben Letaief, Ying Jun Zhang
ICNP
2005
IEEE
15 years 9 months ago
Priority Pricing in Utility Fair Networks
This paper deals with a new pricing approach in utility fair networks, where the user’s application is associated with a utility function. We allow users to have concave as well...
Tobias Harks, Tobias Poschwatta
151
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Opportunistic Fair Scheduling over Multiple Wireless Channels
Abstract— Emerging spread spectrum high-speed data networks utilize multiple channels via orthogonal codes or frequency-hopping patterns such that multiple users can transmit con...
Yonghe Liu, Edward W. Knightly