Sciweavers

9186 search results - page 26 / 1838
» A Module System for Scheme
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
IPPS
2002
IEEE
14 years 25 days ago
Automatic Reincarnation of Deceased Plug-Ins in the HARNESS Metacomputing System
HARNESS is an experimental metacomputing system that supports dynamic software reconfiguration, both of the resources that comprise the virtual machine and the services provided t...
Mauro Migliardi, Vaidy S. Sunderam
ICASSP
2010
IEEE
13 years 5 months ago
Energy-aware adaptive OFDM systems
An effective way of reducing the energy consumption without affecting the quality of service is by adapting to the channel conditions. In this paper we describe one such scheme fo...
Yunus Emre, Chaitali Chakrabarti
ICIP
2009
IEEE
14 years 9 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
PIMRC
2010
IEEE
13 years 5 months ago
On Maximum Likelihood MIMO detection in QAM-FBMC systems
Multi-carrier modulation and especially CP-OFDM is widely used nowadays in several radio communications. However, FBMC is a potential alternative to CP-OFDM since it does not requi...
R. Zakaria, Didier Le Ruyet