Sciweavers

3910 search results - page 701 / 782
» Analyzing Cross-Connected Networks
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 11 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
HPDC
2010
IEEE
13 years 11 months ago
ParaText: scalable text modeling and analysis
Automated analysis of unstructured text documents (e.g., web pages, newswire articles, research publications, business reports) is a key capability for solving important problems ...
Daniel M. Dunlavy, Timothy M. Shead, Eric T. Stant...
GECCO
2008
Springer
172views Optimization» more  GECCO 2008»
13 years 11 months ago
Empirical analysis of a genetic algorithm-based stress test technique
Evolutionary testing denotes the use of evolutionary algorithms, e.g., Genetic Algorithms (GAs), to support various test automation tasks. Since evolutionary algorithms are heuris...
Vahid Garousi
GLOBECOM
2008
IEEE
13 years 11 months ago
On the Impact of Inter-Cell Interference in LTE
—While intercell interference coordination (ICIC) for the downlink of multi-cell systems in general and orthogonal frequency division multiple access (OFDMA) networks in particul...
András Rácz, Norbert Reider, G&aacut...
GLOBECOM
2008
IEEE
13 years 11 months ago
Cooperative OFDM Channel Estimation with Frequency Offsets
Abstract— This paper discusses channel estimation in a cooperative orthogonal frequency-division multiplexing (OFDM) network in the presence of frequency offsets. Both the amplif...
Zhongshan Zhang, Wei Zhang, Chintha Tellambura