Sciweavers

1080 search results - page 127 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
RAID
2000
Springer
15 years 1 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
FGCS
2006
121views more  FGCS 2006»
14 years 9 months ago
Real-time multi-scale brain data acquisition, assembly, and analysis using an end-to-end OptIPuter
At iGrid 2005 we demonstrated the transparent operation of a biology experiment on a test-bed of globally distributed visualization, storage, computational, and network resources....
Rajvikram Singh, Nicholas Schwarz, Nut Taesombut, ...
TIT
2008
87views more  TIT 2008»
14 years 9 months ago
Decode-and-Forward Relaying With Quantized Channel State Feedback: An Outage Exponent Analysis
The problem of resource allocation to maximize the outage exponent over a fading relay channel using the decodeand-forward protocol with quantized channel state feedback (CSF) is s...
Thanh Tùng Kim, Giuseppe Caire, Mikael Skog...
TWC
2008
112views more  TWC 2008»
14 years 9 months ago
Throughput Analysis of TCP-Friendly Rate Control in Mobile Hotspots
By integrating wireless wide area networks (WWANs) and wireless local area networks (WLANs), mobile hotspot technologies enable seamless Internet multimedia services to users on-bo...
Sangheon Pack, Xuemin Shen, Jon W. Mark, Lin Cai
INFOCOM
2010
IEEE
14 years 8 months ago
Queuing Analysis in Multichannel Cognitive Spectrum Access: A Large Deviation Approach
Abstract—The queueing performance of a (secondary) cognitive user is investigated for a hierarchical network where there are N independent and identical primary users. Each prima...
Amine Laourine, Shiyao Chen, Lang Tong