Sciweavers

13007 search results - page 2406 / 2602
» Wireless and Mobile Networking
Sort
View
IAW
2003
IEEE
14 years 2 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ITCC
2003
IEEE
14 years 2 months ago
Scalable Layered Multicast with Explicit Congestion Notification
Many Layered Multicast (LM) congestion control schemes have been proposed to serve different users with heterogeneous bandwidth requirements. Most of the LM algorithms suffer from...
Li Zhu, Nirwan Ansari, Zafer Sahinoglu, Anthony Ve...
WETICE
2003
IEEE
14 years 2 months ago
On Optimal Update Policies and Cluster Sizes for 2-Tier Distributed Systems
We try to analyze a generic model for 2-tier distributed systems, exploring the possibility of optimal cluster sizes from an information management perspective, such that the over...
Prasenjit Dey, Anwitaman Datta
SEMWEB
2001
Springer
14 years 1 months ago
An RDF Framework for Resource Discovery
Resource discovery is a problem common to almost all distributed systems. Instead of resulting in a one or a small number of discovery mechanisms, completely different and incompa...
Franklin Reynolds
ICC
2000
IEEE
211views Communications» more  ICC 2000»
14 years 1 months ago
Higher Order Adaptive Filter Based Predistortion for Nonlinear Distortion Compensation of Radio over Fiber Links
 The biggest limitation of Radio over Fiber (ROF) links in a wireless network is its limited dynamic range due to ‘Non Linear Distortions’ (NLD). In this paper a higher orde...
Xavier N. Fernando, Abu B. Sesay
« Prev « First page 2406 / 2602 Last » Next »