Sciweavers

15375 search results - page 2977 / 3075
» cans 2008
Sort
View
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 11 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 11 months ago
Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network
— In recent years, many high-speed congestion control (HSCC) algorithms have been proposed for utilizing network pipes with huge bandwidth-delay product (BDP), and some of them h...
Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda
ICC
2008
IEEE
115views Communications» more  ICC 2008»
15 years 11 months ago
Oblivious Routing for Wireless Mesh Networks
—Wireless mesh networks have attracted increasing attention and deployment as a high-performance and low-cost solution to last-mile broadband Internet access. Traffic routing pl...
Jonathan Wellons, Yuan Xue
ICC
2008
IEEE
197views Communications» more  ICC 2008»
15 years 11 months ago
V-BLAST Receiver and Performance In MIMO Relay Networks with Imperfect CSI
Abstract —Previous work demonstrated that the improvements in spectral efficiency and link reliability can be obtained in wireless relay networks employing terminals with MIMO c...
Jiansong Chen, Xiaoli Yu, C. C. Jay Kuo
ICCCN
2008
IEEE
15 years 11 months ago
Localized Bridging Centrality for Distributed Network Analysis
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
Soumendra Nanda, David Kotz
« Prev « First page 2977 / 3075 Last » Next »