Sciweavers

334 search results - page 57 / 67
» Approximation Algorithms for Non-Uniform Buy-at-Bulk Network...
Sort
View
CONEXT
2010
ACM
13 years 6 months ago
Auto-configuration of 802.11n WLANs
Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of...
Mustafa Y. Arslan, Konstantinos Pelechrinis, Ioann...
SIAMDM
2010
113views more  SIAMDM 2010»
13 years 3 months ago
The VPN Problem with Concave Costs
We consider the following network design problem. We are given an undirected network with costs on the edges, a set of terminals, and an upper bound for each terminal limiting the ...
Samuel Fiorini, Gianpaolo Oriolo, Laura Sanit&agra...
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
14 years 9 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor
CORR
2011
Springer
243views Education» more  CORR 2011»
13 years 3 months ago
Distributed Estimation and False Data Detection with Application to Power Networks
This work presents a distributed method for control centers in a power network to estimate the operating condition of the power plant, and to ultimately determine the occurrence o...
Fabio Pasqualetti, Ruggero Carli, Francesco Bullo
CCS
2004
ACM
14 years 2 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash