Sciweavers

3247 search results - page 612 / 650
» Randomized smoothing networks
Sort
View
JSAC
2011
115views more  JSAC 2011»
14 years 6 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
BCB
2010
175views Bioinformatics» more  BCB 2010»
14 years 6 months ago
Gene set analysis using principal components
We present a new method for identifying gene sets associated with labeled samples, where the labels can be case versus control, or genotype differences. Existing approaches to thi...
Isa Kemal Pakatci, Wei Wang, Leonard McMillan
INFOCOM
2011
IEEE
14 years 3 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
QUESTA
2011
14 years 2 months ago
Uniform approximations for the M/G/1 queue with subexponential processing times
: This paper studies the asymptotic behavior of the steady-state waiting time, W∞, of the M/G/1 queue with subexponenential processing times for different combinations of traffi...
Mariana Olvera-Cravioto, Peter W. Glynn
CEC
2011
IEEE
13 years 11 months ago
Modeling HIV spread through sexual contact using a cellular automaton
Abstract—Having a risky sexual behavior increases the likelihood of infection by the Human Immunodeficiency Virus (HIV), which causes the Acquired Immunodeficiency Syndrome (AI...
Azadeh Alimadad, Vahid Dabbaghian, Suraj K. Singhk...