Sciweavers

5234 search results - page 890 / 1047
» Simulation of Computer Network Attacks
Sort
View
136
Voted
ICML
2009
IEEE
16 years 4 months ago
Learning structurally consistent undirected probabilistic graphical models
In many real-world domains, undirected graphical models such as Markov random fields provide a more natural representation of the dependency structure than directed graphical mode...
Sushmita Roy, Terran Lane, Margaret Werner-Washbur...
128
Voted
PERCOM
2009
ACM
16 years 4 months ago
Practical Rate Adaptation in Mobile Environments
Channel asymmetry and high fluctuation of channel conditions are two salient characteristics of wireless channels in mobile environments. Therefore, when using IEEE 802.11 devices ...
Xi Chen, Prateek Gangwal, Daji Qiao
155
Voted
EWSN
2009
Springer
16 years 4 months ago
Solving the Wake-Up Scattering Problem Optimally
Abstract. In their EWSN'07 paper [1], Giusti et al. proposed a decentralized wake-up scattering algorithm for temporally spreading the intervals in which the nodes of a wirele...
Luigi Palopoli, Roberto Passerone, Amy L. Murphy, ...
102
Voted
PERCOM
2006
ACM
16 years 3 months ago
Virtual Channel Management for Densely Deployed IEEE 802.15.4 LR-WPANs
The number of channels specified for IEEE 802.15.4 Low-Rate Wireless Personal Area Networks (LR-WPANs) is too few to operate many applications of WPANs in the same area. To overco...
Tae-Hyun Kim, Jae Yeol Ha, Sunghyun Choi, Wook Hyu...
97
Voted
MOBISYS
2003
ACM
16 years 3 months ago
Host Mobility Using an Internet Indirection Infrastructure
We propose the Robust Overlay Architecture for Mobility (ROAM) to provide seamless mobility for Internet hosts. ROAM is built on top of the Internet Indirection Infrastructure (i3...
Shelley Zhuang, Kevin Lai, Ion Stoica, Randy H. Ka...