Sciweavers

248 search results - page 50 / 50
» Characterizing a spam traffic
Sort
View
JSAC
2008
254views more  JSAC 2008»
13 years 7 months ago
Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet sch...
Hang Su, Xi Zhang
CCR
2004
86views more  CCR 2004»
13 years 7 months ago
IPv4 address allocation and the BGP routing table evolution
The IP address consumption and the global routing table size are two of the vital parameters of the Internet growth. In this paper we quantitatively characterize the IPv4 address ...
Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Hu...
GI
2009
Springer
13 years 5 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser