Sciweavers

899 search results - page 63 / 180
» On Wiretap Networks II
Sort
View
WD
2010
15 years 1 months ago
CAODV: Routing in mobile ad-hoc cognitive radio networks
This paper deals with the routing in cognitive mobile ad hoc networks. We propose to modify the widely adopted Ad-hoc On-demand Distance Vector (AODV) protocol [1] in order to assu...
Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello...
162
Voted
TCBB
2010
163views more  TCBB 2010»
14 years 10 months ago
Classification of Protein-Protein Interaction Full-Text Documents Using Text and Citation Network Features
Abstract--We participated (as Team 9) in the Article Classification Task of the Biocreative II.5 Challenge: binary classification of fulltext documents relevant for protein-protein...
Artemy Kolchinsky, Alaa Abi-Haidar, Jasleen Kaur, ...
ICASSP
2011
IEEE
14 years 7 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
114
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Making sense of customer tickets in cellular networks
—Effective management of large-scale cellular data networks is critical to meet customer demands and expectations. Customer calls for technical support provide direct indication ...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
126
Voted
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
16 years 18 days ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...