Sciweavers

5234 search results - page 843 / 1047
» Simulation of Computer Network Attacks
Sort
View
KDD
2008
ACM
142views Data Mining» more  KDD 2008»
16 years 4 months ago
Weighted graphs and disconnected components: patterns and a generator
The vast majority of earlier work has focused on graphs which are both connected (typically by ignoring all but the giant connected component), and unweighted. Here we study numer...
Mary McGlohon, Leman Akoglu, Christos Faloutsos
WCNC
2008
IEEE
15 years 10 months ago
An Uplink Medium Access Protocol with SDMA Support for Multiple-Antenna WLANs
— In this paper, we propose a contention based uplink Medium Access Control (MAC) protocol design for Wireless Local Area Networks (WLANs) with Spatial Division Multiple Access (...
Sheng Zhou, Zhisheng Niu
RTSS
2007
IEEE
15 years 10 months ago
Sea Depth Measurement with Restricted Floating Sensors
Sea depth monitoring is a critical task to ensure the safe operation of harbors. Traditional schemes largely rely on labor-intensive work and expensive hardware. This study explor...
Zheng Yang, Mo Li, Yunhao Liu
EUROPAR
2007
Springer
15 years 10 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...
EUROSSC
2007
Springer
15 years 10 months ago
Inferring and Distributing Spatial Context
An increasing number of computationally enhanced objects is distributed around us in physical space, which are equipped – or at least can be provided – with sensors for measuri...
Clemens Holzmann