Sciweavers

799 search results - page 146 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
IPSN
2010
Springer
14 years 2 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...
CDC
2008
IEEE
134views Control Systems» more  CDC 2008»
14 years 2 months ago
Networked control systems with packet delays and losses
— We investigate the effect of packet delays and packet drops on networked control systems. First we consider the problem of where to locate a controller or state estimator in a...
Craig L. Robinson, P. R. Kumar
BMCBI
2008
166views more  BMCBI 2008»
13 years 7 months ago
Learning transcriptional regulatory networks from high throughput gene expression data using continuous three-way mutual informa
Background: Probability based statistical learning methods such as mutual information and Bayesian networks have emerged as a major category of tools for reverse engineering mecha...
Weijun Luo, Kurt D. Hankenson, Peter J. Woolf
PR
2006
78views more  PR 2006»
13 years 7 months ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...
GLOBECOM
2008
IEEE
14 years 2 months ago
Collaborative Opportunistic Spectrum Access in the Presence of Multiple Transmitters
Abstract— We present a collaborative algorithm to enable opportunistic spectrum access for cognitive radios in the presence of multiple co-channel transmitters. A spectrum hole d...
Ahmed O. Nasif, Brian L. Mark