Sciweavers

2248 search results - page 341 / 450
» Using Bayesian networks to analyze expression data
Sort
View
ICC
2009
IEEE
142views Communications» more  ICC 2009»
15 years 11 months ago
Revealing Social Networks of Spammers Through Spectral Clustering
—To date, most studies on spam have focused only on the spamming phase of the spam cycle and have ignored the harvesting phase, which consists of the mass acquisition of email ad...
Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woo...
HPDC
2008
IEEE
15 years 10 months ago
Key-based consistency and availability in structured overlay networks
Structured Overlay Networks provide a promising platform for high performance applications since they are scalable, fault-tolerant and self-managing. Structured overlays provide l...
Tallat M. Shafaat, Thorsten Schütt, Monika Mo...
ITCC
2005
IEEE
15 years 9 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
138
Voted
GLOBECOM
2009
IEEE
15 years 8 months ago
Optimization of Energy Efficient Transmission in Underwater Sensor Networks
Underwater communication is a challenging topic due to its singular channel characteristics. Most protocols used in terrestrial wireless communication can not be directly applied i...
Hongkun Yang, Bin Liu, Fengyuan Ren, Hao Wen, Chua...
TMC
2010
230views more  TMC 2010»
15 years 2 months ago
Bandwidth Recycling in IEEE 802.16 Networks
—IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each application to ensure the QoS. Fo...
D. Chuck, J. M. Chang