Sciweavers

4647 search results - page 839 / 930
» Analysis and design of OFDM-IDMA systems
Sort
View
MOBIHOC
2010
ACM
13 years 7 months ago
Globs in the primordial soup: the emergence of connected crowds in mobile wireless networks
In many practical scenarios, nodes gathering at points of interest yield sizable connected components (clusters), which sometimes comprise the majority of nodes. While recent anal...
Simon Heimlicher, Kavé Salamatian
MODELS
2010
Springer
13 years 7 months ago
transML: A Family of Languages to Model Model Transformations
Model transformation is one of the pillars of Model-Driven Engineering (MDE). The increasing complexity of systems and modelling languages has dramatically raised the complexity an...
Esther Guerra, Juan de Lara, Dimitrios S. Kolovos,...
PIMRC
2010
IEEE
13 years 7 months ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener
RAID
2010
Springer
13 years 7 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
SEMWEB
2010
Springer
13 years 7 months ago
Optimize First, Buy Later: Analyzing Metrics to Ramp-Up Very Large Knowledge Bases
As knowledge bases move into the landscape of larger ontologies and have terabytes of related data, we must work on optimizing the performance of our tools. We are easily tempted t...
Paea LePendu, Natalya Fridman Noy, Clement Jonquet...