Sciweavers

99 search results - page 11 / 20
» Detecting Traffic Problems with ILP
Sort
View
PIMRC
2010
IEEE
13 years 5 months ago
Power control versus multiuser detection based cross-layer design in wireless ad hoc networks
Abstract--In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a c...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
MICRO
1993
IEEE
93views Hardware» more  MICRO 1993»
13 years 11 months ago
Speculative execution exception recovery using write-back suppression
Compiler-controlled speculative execution has been shown to be e ective in increasing the availableinstruction level parallelismILP found in non-numeric programs. An importantpr...
Roger A. Bringmann, Scott A. Mahlke, Richard E. Ha...
DIMVA
2006
13 years 9 months ago
Network-Level Polymorphic Shellcode Detection Using Emulation
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
TSP
2010
13 years 2 months ago
Distributed detection of multi-hop information flows with fusion capacity constraints
The problem of detecting multi-hop information flows subject to communication constraints is considered. In a distributed detection scheme, eavesdroppers are deployed near nodes in...
Ameya Agaskar, Ting He, Lang Tong
IEEEIAS
2008
IEEE
14 years 1 months ago
Ensemble of One-Class Classifiers for Network Intrusion Detection System
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensembl...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...