Sciweavers

1738 search results - page 278 / 348
» An algorithmic framework for network reconstruction
Sort
View
143
Voted
COMCOM
2006
154views more  COMCOM 2006»
15 years 3 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
134
Voted
WIOPT
2010
IEEE
15 years 2 months ago
Reservation policies for revenue maximization from secondary spectrum access in cellular networks
We consider the problem of providing opportunistic spectrum access to secondary users in wireless cellular networks. From the standpoint of spectrum license holders, achieving ben...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
139
Voted
SIGCOMM
2003
ACM
15 years 9 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
158
Voted
NIPS
2003
15 years 5 months ago
Max-Margin Markov Networks
In typical classification tasks, we seek a function which assigns a label to a single object. Kernel-based approaches, such as support vector machines (SVMs), which maximize the ...
Benjamin Taskar, Carlos Guestrin, Daphne Koller
162
Voted
ICC
2009
IEEE
152views Communications» more  ICC 2009»
15 years 1 months ago
System Spectral Efficiency and Stability of 3G Networks: A Comparative Study
CDMA2000, WCDMA and WiMAX are three widely used 3G technologies. Since they share the same goal, which is to provide broader coverage and higher throughput in 3G networks, an impar...
Yuehong Gao, Xin Zhang, Yuming Jiang, Jeong-woo Ch...