Sciweavers

1080 search results - page 149 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
DSOM
2003
Springer
15 years 3 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
SIGCOMM
2012
ACM
13 years 6 days ago
Spinal codes
A fundamental problem in wireless networks is to develop communication protocols that achieve high throughput in the face of noise, interference, and fading, all of which vary wit...
Jonathan Perry, Peter Iannucci, Kermin Fleming, Ha...
BMCBI
2011
14 years 4 months ago
Comparing genotyping algorithms for Illumina's Infinium whole-genome SNP BeadChips
Background: Illumina’s Infinium SNP BeadChips are extensively used in both small and large-scale genetic studies. A fundamental step in any analysis is the processing of raw all...
Matthew E. Ritchie, Ruijie Liu, Benilton Carvalho,...
IWCMC
2009
ACM
15 years 4 months ago
Adaptive antenna selection at mobile stations for SDMA in WiMAX networks
The IEEE 802.16/WiMAX standards has fully embraced multi-antenna technology and can, thus, deliver robust performance and high transmission rates. Nevertheless, due to its inheren...
Tairan Wang, Zhifeng Tao, Andreas F. Molisch, Phil...
IADIS
2003
14 years 11 months ago
Scalability of Cooperative Algorithms for Distributed Architectures of Proxy Servers
Systems consisting of multiple proxy servers are a popular solution to deal with performance and network resource utilization problems related to the growth of the Web numbers. Af...
Riccardo Lancellotti, Francesca Mazzoni, Michele C...