Sciweavers

660 search results - page 78 / 132
» A general filter for measurements with any probability distr...
Sort
View
IWCMC
2006
ACM
14 years 2 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
CORR
2011
Springer
155views Education» more  CORR 2011»
13 years 3 months ago
Subexponential convergence for information aggregation on regular trees
— We consider the decentralized binary hypothesis testing problem on trees of bounded degree and increasing depth. For a regular tree of depth t and branching factor k ≥ 2, we ...
Yashodhan Kanoria, Andrea Montanari
BMCBI
2010
113views more  BMCBI 2010»
13 years 9 months ago
Statistical method on nonrandom clustering with application to somatic mutations in cancer
Background: Human cancer is caused by the accumulation of tumor-specific mutations in oncogenes and tumor suppressors that confer a selective growth advantage to cells. As a conse...
Jingjing Ye, Adam Pavlícek, Elizabeth A. Lu...
SAGA
2009
Springer
14 years 3 months ago
Bounds for Multistage Stochastic Programs Using Supervised Learning Strategies
We propose a generic method for obtaining quickly good upper bounds on the minimal value of a multistage stochastic program. The method is based on the simulation of a feasible dec...
Boris Defourny, Damien Ernst, Louis Wehenkel
WWW
2008
ACM
14 years 9 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang