Sciweavers

329 search results - page 62 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Handling Triple Hidden Terminal Problems for Multi-Channel MAC in Long-Delay Underwater Sensor Networks
In this paper, we investigate the multi-channel MAC problem in underwater acoustic sensor networks. To reduce hardware cost, only one acoustic transceiver is often preferred on ev...
Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zaihan Jiang
BMCBI
2008
141views more  BMCBI 2008»
13 years 7 months ago
Functional discrimination of membrane proteins using machine learning techniques
Background: Discriminating membrane proteins based on their functions is an important task in genome annotation. In this work, we have analyzed the characteristic features of amin...
M. Michael Gromiha, Yukimitsu Yabuki
GLOBECOM
2008
IEEE
14 years 1 months ago
Friendly P2P: Application-Level Congestion Control for Peer-to-Peer Applications
Abstract—Peer-to-Peer (P2P) file sharing applications use multiple TCP connections between peers to transfer data. The aggressiveness and robustness of P2P technology remarkably...
YaNing Liu, Hongbo Wang, Yu Lin, Shiduan Cheng, Gw...
CIC
2003
150views Communications» more  CIC 2003»
13 years 8 months ago
Performance Modeling of a Cluster of Workstations
Using off-the-shelf commodity workstations to build a cluster for parallel computing has become a common practice. In studying or designing a cluster of workstations one should ha...
Ahmed M. Mohamed, Lester Lipsky, Reda A. Ammar
UAI
2001
13 years 8 months ago
Learning the Dimensionality of Hidden Variables
A serious problem in learning probabilistic models is the presence of hidden variables. These variables are not observed, yet interact with several of the observed variables. Dete...
Gal Elidan, Nir Friedman