Sciweavers

98 search results - page 17 / 20
» Utilizing network features for privacy violation detection
Sort
View
ARTMED
2004
118views more  ARTMED 2004»
13 years 7 months ago
Bayesian fluorescence in situ hybridisation signal classification
Previous research has indicated the significance of accurate classification of fluorescence in situ hybridisation (FISH) signals for the detection of genetic abnormalities. Based ...
Boaz Lerner
CCS
2006
ACM
13 years 11 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
JSAC
2011
191views more  JSAC 2011»
13 years 2 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
MACOM
2010
13 years 5 months ago
Static Inter-Cell Interference Coordination Techniques for LTE Networks: A Fair Performance Assessment
Abstract. This paper focuses in the analysis of 100% static and distributed inter-cell interference coordination techniques in the context of LTE networks. Several methods have bee...
David González González, Mario Garc&...
ITIIS
2010
131views more  ITIIS 2010»
13 years 5 months ago
The Analysis of Random Propagating Worms using Network Bandwidth
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model ...
Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young...