Sciweavers

3641 search results - page 90 / 729
» A System Design Methodology for Telecommunication Network Ap...
Sort
View
WEBI
2009
Springer
15 years 11 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
DAC
2001
ACM
16 years 5 months ago
Detection of Partially Simultaneously Alive Signals in Storage Requirement Estimation for Data Intensive Applications
In this paper, we propose a novel storage requirement estimation methodology for use in the early system design phases when the data transfer ordering is only partially fixed. At ...
Per Gunnar Kjeldsberg, Francky Catthoor, Einar J. ...
SAC
2006
ACM
15 years 10 months ago
Building the functional performance model of a processor
In this paper, we present an efficient procedure for building a piecewise linear function approximation of the speed function of a processor with hierarchical memory structure. Th...
Alexey L. Lastovetsky, Ravi Reddy, Robert Higgins
GLOBECOM
2008
IEEE
15 years 10 months ago
A Distributed System for Cooperative MIMO Transmissions
— In this paper we propose a distributed system for facilitating cooperative MIMO transmissions in networks without multiple antenna devices. MIMO diversity is achieved by employ...
Hsin-Yi Shen, Haiming Yang, Biplab Sikdar, Shivkum...
GLOBECOM
2008
IEEE
15 years 10 months ago
A Low-Signalling Scheme for Distributed Resource Allocation in Multi-Cellular OFDMA Systems
—This paper considers distributed protocol design for joint sub-carrier, transmission scheduling and power management in uplink/downlink multi-cellular OFDMA wireless networks. T...
Pablo Soldati, Mikael Johansson