Sciweavers

4007 search results - page 615 / 802
» Computation with imprecise probabilities
Sort
View
IWCMC
2006
ACM
15 years 10 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
SIGECOM
2006
ACM
143views ECommerce» more  SIGECOM 2006»
15 years 10 months ago
Braess's paradox in large random graphs
Braess’s Paradox is the counterintuitive but well-known fact that removing edges from a network with “selfish routing” can decrease the latency incurred by traffic in an eq...
Gregory Valiant, Tim Roughgarden
VALUETOOLS
2006
ACM
125views Hardware» more  VALUETOOLS 2006»
15 years 10 months ago
An approximative method for calculating performance measures of Markov processes
We present a new approximation method called value extrapolation for Markov processes with large or infinite state spaces. The method can be applied for calculating any performan...
Juha Leino, Jorma T. Virtamo
AICCSA
2005
IEEE
124views Hardware» more  AICCSA 2005»
15 years 10 months ago
On multicast scheduling and routing in multistage Clos networks
Multicast communication, which involves transmitting information from one node to multiple nodes, is a vital operation in both broadband integrated services digital networks (BISD...
Bin Tang
COLCOM
2005
IEEE
15 years 10 months ago
Location assisted routing for near-far effect mitigation in wireless networks
CDMA technology represents an attractive choice for various wireless ad hoc networks applications, due to its appealing properties, such as resistance to jamming and interference,...
Hassan Mahmood, Cristina Comaniciu