Sciweavers

436 search results - page 71 / 88
» An extension of the ns simulator for active network research
Sort
View
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 8 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
MOBIQUITOUS
2007
IEEE
14 years 2 months ago
Minimum Disruption Service Composition and Recovery over Mobile Ad Hoc Networks
— The dynamic nature of mobile ad hoc networks poses fundamental challenges to the design of service composition schemes that can minimize the effect of service disruptions. Alth...
Shanshan Jiang, Yuan Xue, Douglas C. Schmidt
NETCOOP
2009
Springer
14 years 3 months ago
User Association to Optimize Flow Level Performance in Wireless Systems with Dynamic Interference
We study the impact of user association policies on flow-level performance in interference limited wireless networks. Most research in this area has used static interference model...
Balaji Rengarajan, Gustavo de Veciana
TISSEC
2010
119views more  TISSEC 2010»
13 years 3 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
PVLDB
2010
163views more  PVLDB 2010»
13 years 7 months ago
Event Processing - past, present and future
Analysts have marked Event Processing as the most growing segment in enterprise computing during years 2008 and 2009, furthermore, this trend is expected to continue. Many of the ...
Opher Etzion