Sciweavers

2028 search results - page 240 / 406
» Highly Predictive Blacklisting
Sort
View
SIPS
2006
IEEE
14 years 3 months ago
A New Early Termination Scheme of Iterative Turbo Decoding Using Decoding Threshold
Although many stopping methods of iterative decoding have been discussed in the literatures extensively, many of them only focus on the solvable decoding. In this paper, we propos...
Fan-Min Li, Cheng-Hung Lin, An-Yeu Wu
ICNP
2005
IEEE
14 years 2 months ago
MuON: Epidemic Based Mutual Anonymity
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. W...
Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean...
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
14 years 2 months ago
Using MEMS-Based Storage to Boost Disk Performance
Non-volatile storage technologies such as flash memory, Magnetic RAM (MRAM), and MEMS-based storage are emerging as serious alternatives to disk drives. Among these, MEMS storage...
Feng Wang 0003, Bo Hong, Scott A. Brandt, Darrell ...
VTS
2005
IEEE
162views Hardware» more  VTS 2005»
14 years 2 months ago
Low-Cost Alternate EVM Test for Wireless Receiver Systems
† In digital radio applications, error-vector-magnitude (EVM) is the primary specification which quantifies the performance of digital modulation implemented in silicon. Producti...
Achintya Halder, Abhijit Chatterjee
WIDM
2005
ACM
14 years 2 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...