Sciweavers

1080 search results - page 153 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
GLOBECOM
2006
IEEE
15 years 3 months ago
A Lightweight Secure Solution for RFID
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
Bo Sun, Chung-Chih Li, Yang Xiao
IDA
2005
Springer
15 years 3 months ago
Bayesian Networks Learning for Gene Expression Datasets
DNA arrays yield a global view of gene expression and can be used to build genetic networks models, in order to study relations between genes. Literature proposes Bayesian network ...
Giacomo Gamberoni, Evelina Lamma, Fabrizio Riguzzi...
USENIX
2000
14 years 11 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
EUROSYS
2008
ACM
15 years 6 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti
MSWIM
2005
ACM
15 years 3 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins