Sciweavers

3038 search results - page 488 / 608
» High-Speed Function Approximation
Sort
View
RAID
2009
Springer
15 years 11 months ago
Using Formal Grammar and Genetic Operators to Evolve Malware
In this paper, we leverage the concepts of formal grammar and genetic operators to evolve malware. As a case study, we take COM infectors and design their formal grammar with produ...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
IWCMC
2009
ACM
15 years 11 months ago
Quantized transmit beamforming with antenna selection in a MIMO channel
For a point-to-point multi-input multi-output (MIMO) wireless channel, we propose a feedback scheme, which consists of transmit-antenna selection algorithm and beamforming quantiz...
Wiroonsak Santipach
APCHI
2008
IEEE
15 years 11 months ago
On Generating Backbone Trees through Robust Multi-hop Clusters in Wireless Sensor Networks
Routing through a backbone, which is responsible for performing and managing multipoint communication, reduces the communication overhead and overall energy consumption in wireless...
Inyoung Shin, Moonseong Kim, Hyunseung Choo
CVPR
2008
IEEE
15 years 11 months ago
A theoretical analysis of linear and multi-linear models of image appearance
Linear and multi-linear models of object shape/appearance (PCA, 3DMM, AAM/ASM, multilinear tensors) have been very popular in computer vision. In this paper, we analyze the validi...
Yilei Xu, Amit K. Roy Chowdhury
GLOBECOM
2008
IEEE
15 years 11 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar