Sciweavers

3146 search results - page 465 / 630
» Efficient Consequence Finding
Sort
View
131
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Bargaining to Improve Channel Sharing between Selfish Cognitive Radios
We consider a problem where two selfish cognitive radio users try to share two channels on which they each have potentially different valuations. We first formulate the problem as ...
Hua Liu, Allen B. MacKenzie, Bhaskar Krishnamachar...
133
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
120
Voted
ASAP
2004
IEEE
102views Hardware» more  ASAP 2004»
15 years 7 months ago
A Hierarchical Classification Scheme to Derive Interprocess Communication in Process Networks
The Compaan compiler automatically derives a Process Network (PN) description from an application written in Matlab. The basic element of a PN is a Producer/Consumer (P/C) pair. F...
Alexandru Turjan, Bart Kienhuis, Ed F. Deprettere
110
Voted
ATS
2004
IEEE
93views Hardware» more  ATS 2004»
15 years 7 months ago
Hybrid BIST Test Scheduling Based on Defect Probabilities
1 This paper describes a heuristic for system-on-chip test scheduling in an abort-on-fail context, where the test is terminated as soon as a defect is detected. We consider an hybr...
Zhiyuan He, Gert Jervan, Zebo Peng, Petru Eles
162
Voted
APNOMS
2006
Springer
15 years 7 months ago
Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks
Setting up an IDS architecture on ad-hoc network is hard because it is not easy to find suitable locations to setup IDS's. One way is to divide the network into a set of clust...
Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim