Sciweavers

3809 search results - page 618 / 762
» Randomized Broadcast in Networks
Sort
View
HSNMC
2004
Springer
125views Multimedia» more  HSNMC 2004»
15 years 4 months ago
A Pull-Based Approach for a VoD Service in P2P Networks
We study a new approach to provide an efficient VoD service to a large client population in P2P networks. Previous work has suggested to construct a multicast tree to distribute t...
Anwar Al Hamra, Ernst W. Biersack, Guillaume Urvoy...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 4 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
CIC
2006
121views Communications» more  CIC 2006»
15 years 19 days ago
Performance Studies of a Coding Scheme for a Slepian-Wolf Source Network
- We investigate the simplest Slepian-Wolf source network, consisting of an information source correlated with a second source used as a side-information for the decoder but not th...
Azizuddin Abdul Aziz, John C. Kieffer
BMCBI
2008
162views more  BMCBI 2008»
14 years 11 months ago
Improved identification of conserved cassette exons using Bayesian networks
Background: Alternative splicing is a major contributor to the diversity of eukaryotic transcriptomes and proteomes. Currently, large scale detection of alternative splicing using...
Rileen Sinha, Michael Hiller, Rainer Pudimat, Ulri...
COMCOM
2008
145views more  COMCOM 2008»
14 years 11 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...