Sciweavers

1272 search results - page 77 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 6 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
WICON
2010
13 years 7 months ago
Resource Allocation and Reuse for Inter-cell Interference Mitigation in OFDMA based Communication Networks
Inter-cell interference (ICI) mitigation is always a big challenge issue in cellular systems. In this work we propose an Enhanced Fractional Frequency Reuse (EFFR) scheme with an i...
Zheng Xie, Bernhard Walke
WOSP
2005
ACM
14 years 2 months ago
Applying SPE techniques for modeling a grid-enabled JAVA platform
Advances in Internet and the availability of powerful computers and high-speed networks have propitiated the rise of Grids. The scheduling of applications is complex in Grids due ...
Mariela Curiel, M. Angélica Pérez, R...
INFOCOM
2009
IEEE
14 years 3 months ago
A Measurement Based Rogue AP Detection Scheme
—This paper considers a category of rogue access points (APs) that pretend to be legitimate APs to lure users to connect to them. We propose a practical timing based technique th...
Hao Han, Bo Sheng, Chee Wei Tan, Qun Li, Sanglu Lu
ISMIS
2009
Springer
14 years 3 months ago
Semantic-Based Top-k Retrieval for Competence Management
Abstract. We present a knowledge-based system, for skills and talent management, exploiting semantic technologies combined with top-k retrieval techniques. The system provides adva...
Umberto Straccia, Eufemia Tinelli, Simona Colucci,...