Sciweavers

913 search results - page 95 / 183
» Full Abstraction for Linda
Sort
View
NOMS
2008
IEEE
14 years 3 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
VTC
2008
IEEE
186views Communications» more  VTC 2008»
14 years 3 months ago
Downlink Limited Feedback Transmission Schemes for Asymmetric MIMO Channels
Abstract—In multiple-input multiple-output (MIMO) broadcast channels, multiuser diversity is exploited by scheduling data transmission to users with best channel conditions. To ...
Mohsen Eslami, Witold A. Krzymien
WCNC
2008
IEEE
14 years 3 months ago
Analysis of Interference from Large Clusters as Modeled by the Sum of Many Correlated Lognormals
Abstract—We examine the statistical distribution of the interference produced by a cluster of very many co-channel interferers, e.g., a sensor network, or a city full of active w...
Sebastian S. Szyszkowicz, Halim Yanikomeroglu
CIBCB
2007
IEEE
14 years 3 months ago
A Comparison of Sequence Kernels for Localization Prediction of Transmembrane Proteins
Abstract— We applied Support Vector Machines to the prediction of the subcellular localization of transmembrane proteins, and compared the performance of different sequence kerne...
Stefan Maetschke, Marcus Gallagher, Mikael Bod&eac...
ESCIENCE
2007
IEEE
14 years 3 months ago
Connecting Scientific Data to Scientific Experiments with Provenance
As scientific workflows and the data they operate on, grow in size and complexity, the task of defining how those workflows should execute (which resources to use, where the resou...
Simon Miles, Ewa Deelman, Paul T. Groth, Karan Vah...