Sciweavers

2419 search results - page 184 / 484
» Modeling Spatio-temporal Network Computations: A Summary of ...
Sort
View
MOBIHOC
2009
ACM
14 years 10 months ago
Characterizing the exit process of a non-saturated IEEE 802.11 wireless network
In this paper, we consider a non-saturated IEEE 802.11 based wireless network. We use a three-way fixed point to model the node behavior with Bernoulli packet arrivals and determi...
Punit Rathod, Onkar Dabeer, Abhay Karandikar, Anir...
ICANNGA
2009
Springer
145views Algorithms» more  ICANNGA 2009»
14 years 3 months ago
Supporting Scalable Bayesian Networks Using Configurable Discretizer Actuators
We propose a generalized model with configurable discretizer actuators as a solution to the problem of the discretization of massive numerical datasets. Our solution is based on a ...
Isaac Olusegun Osunmakinde, Antoine B. Bagula
DSOM
2008
Springer
13 years 11 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
CMSB
2010
Springer
13 years 4 months ago
Stochasticity in reactions: a probabilistic Boolean modeling approach
Boolean modeling frameworks have long since proved their worth for capturing and analyzing essential characteristics of complex systems. Hybrid approaches aim at exploiting the ad...
Sven Twardziok, Heike Siebert, Alexander Heyl
ICCS
2007
Springer
14 years 3 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa