Sciweavers

549 search results - page 72 / 110
» Scaling Behaviors in the Communication Network between Citie...
Sort
View
DATAMINE
2006
157views more  DATAMINE 2006»
14 years 9 months ago
Data Clustering with Partial Supervision
Clustering with partial supervision finds its application in situations where data is neither entirely nor accurately labeled. This paper discusses a semisupervised clustering algo...
Abdelhamid Bouchachia, Witold Pedrycz
MOBIHOC
2009
ACM
15 years 10 months ago
Characterizing the exit process of a non-saturated IEEE 802.11 wireless network
In this paper, we consider a non-saturated IEEE 802.11 based wireless network. We use a three-way fixed point to model the node behavior with Bernoulli packet arrivals and determi...
Punit Rathod, Onkar Dabeer, Abhay Karandikar, Anir...
INFOCOM
2007
IEEE
15 years 4 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
75
Voted
SIGCOMM
2009
ACM
15 years 4 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
NIME
2005
Springer
129views Music» more  NIME 2005»
15 years 3 months ago
Network Latency Adaptive Tempo in the Public Sound Objects System
In recent years Computer Network-Music has increasingly captured the attention of the Computer Music Community. With the advent of Internet communication, geographical displacemen...
Alvaro Barbosa, Jorge Cardoso, Gunter Geiger