Sciweavers

899 search results - page 63 / 180
» On Wiretap Networks II
Sort
View
WD
2010
13 years 6 months ago
CAODV: Routing in mobile ad-hoc cognitive radio networks
This paper deals with the routing in cognitive mobile ad hoc networks. We propose to modify the widely adopted Ad-hoc On-demand Distance Vector (AODV) protocol [1] in order to assu...
Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello...
TCBB
2010
163views more  TCBB 2010»
13 years 3 months ago
Classification of Protein-Protein Interaction Full-Text Documents Using Text and Citation Network Features
Abstract--We participated (as Team 9) in the Article Classification Task of the Biocreative II.5 Challenge: binary classification of fulltext documents relevant for protein-protein...
Artemy Kolchinsky, Alaa Abi-Haidar, Jasleen Kaur, ...
ICASSP
2011
IEEE
13 years 21 days ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
INFOCOM
2011
IEEE
13 years 12 days ago
Making sense of customer tickets in cellular networks
—Effective management of large-scale cellular data networks is critical to meet customer demands and expectations. Customer calls for technical support provide direct indication ...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 6 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...