Sciweavers

598 search results - page 60 / 120
» Typing the Numeric Tower
Sort
View
WCNC
2008
IEEE
14 years 3 months ago
Modeling an Opportunistic Spectrum Sharing System with a Correlated Arrival Process
— In an opportunistic spectrum sharing (OSS) wireless network there are two types of users: primary users and secondary users. The primary users own the license for the system ba...
Shensheng Tang, Brian L. Mark
FOCS
2007
IEEE
14 years 3 months ago
Towards Sharp Inapproximability For Any 2-CSP
We continue the recent line of work on the connection between semidefinite programming-based approximation algorithms and the Unique Games Conjecture. Given any boolean 2-CSP (or...
Per Austrin
BROADNETS
2005
IEEE
14 years 2 months ago
A rate adaptation algorithm for ieee 802.11 wlans based on Mac-Layer Loss Differentiation
— In a WLAN subject to variable wireless channel conditions, rate adaptation plays an important role to more efficiently utilize the physical link. However, the existing rate ada...
Qixiang Pang, Victor C. M. Leung, Soung Chang Liew
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
14 years 2 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
INFOCOM
2003
IEEE
14 years 2 months ago
An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays
— Structured peer-to-peer overlay networks such as CAN, Chord, Pastry, and Tapestry can be used to implement Internet-scale application-level multicast. There are two general app...
Miguel Castro, Michael B. Jones, Anne-Marie Kermar...