Sciweavers

5234 search results - page 703 / 1047
» Simulation of Computer Network Attacks
Sort
View
WWIC
2004
Springer
133views Communications» more  WWIC 2004»
15 years 10 months ago
Design of Energy Efficient Wireless Networks Using Dynamic Data Type Refinement Methodology
Abstract. This paper presents a new perspective to the design of wireless networks using the proposed dynamic data type refinement methodology. In the forthcoming years, new portab...
Stylianos Mamagkakis, Alexandros Mpartzas, Georgio...
132
Voted
LCN
2003
IEEE
15 years 10 months ago
Scheduling Resources in Programmable and Active Networks Based on Adaptive Estimations
In active and programmable networks, packet processing could be accomplished in the router within the data path. For efficient resource allocation in such networks, the packet sch...
Fariza Sabrina, Sanjay Jha
135
Voted
AI
1998
Springer
15 years 9 months ago
A Hybrid Convergent Method for Learning Probabilistic Networks
During past few years, a variety of methods have been developed for learning probabilistic networks from data, among which the heuristic single link forward or backward searches ar...
Jun Liu, Kuo-Chu Chang, Jing Zhou
PETRA
2010
ACM
15 years 9 months ago
Context-aware optimized information dissemination in large scale vehicular networks
Context-aware inter-vehicular communication is considered to be vital for inducing intelligence through the use of embedded computing devices inside vehicles. Vehicles in a scalab...
Yves Vanrompay, Ansar-Ul-Haque Yasar, Davy Preuven...
DGCI
2006
Springer
15 years 8 months ago
A Network Flow Algorithm for Binary Image Reconstruction from Few Projections
Tomography deals with the reconstruction of images from their projections. In this paper we focus on tomographic reconstruction of binary images (i.e., black-and-white) that do not...
Kees Joost Batenburg