Sciweavers

2135 search results - page 107 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
GLOBECOM
2008
IEEE
14 years 2 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
DSN
2009
IEEE
14 years 3 months ago
MAP-AMVA: Approximate mean value analysis of bursty systems
MAP queueing networks are recently proposed models for performance assessment of enterprise systems, such as multi-tier applications, where workloads are significantly affected b...
Giuliano Casale, Evgenia Smirni
ICASSP
2009
IEEE
14 years 3 months ago
A Bayesian NETWORKS approach for dialog modeling: The fusion BN
Bayesian Networks, BNs, are suitable for mixed-initiative dialog modeling allowing a more flexible and natural spoken interaction. This solution can be applied to identify the in...
Fernando F. Fernández-Martínez, Javi...
ICDCS
2006
IEEE
14 years 2 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
WABI
2004
Springer
132views Bioinformatics» more  WABI 2004»
14 years 1 months ago
Joint Analysis of DNA Copy Numbers and Gene Expression Levels
Abstract. Genomic instabilities, amplifications, deletions and translocations are often observed in tumor cells. In the process of cancer pathogenesis cells acquire multiple genom...
Doron Lipson, Amir Ben-Dor, Elinor Dehan, Zohar Ya...