Sciweavers

39039 search results - page 7698 / 7808
» Implementation of the
Sort
View
ISW
2010
Springer
13 years 7 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
MASS
2010
248views Communications» more  MASS 2010»
13 years 7 months ago
Adaptive exploitation of cooperative relay for high performance communications in MIMO ad hoc networks
With the popularity of wireless devices and the increase of computing and storage resources, there are increasing interests in supporting mobile computing techniques. Particularly...
Shan Chu, Xin Wang
MEMOCODE
2010
IEEE
13 years 7 months ago
Proving transaction and system-level properties of untimed SystemC TLM designs
Electronic System Level (ESL) design manages the complexity of todays systems by using abstract models. In this context Transaction Level Modeling (TLM) is state-of-theart for desc...
Daniel Große, Hoang M. Le, Rolf Drechsler
MICRO
2010
IEEE
175views Hardware» more  MICRO 2010»
13 years 7 months ago
Efficient Selection of Vector Instructions Using Dynamic Programming
Accelerating program performance via SIMD vector units is very common in modern processors, as evidenced by the use of SSE, MMX, VSE, and VSX SIMD instructions in multimedia, scien...
Rajkishore Barik, Jisheng Zhao, Vivek Sarkar
MOBIHOC
2010
ACM
13 years 7 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
« Prev « First page 7698 / 7808 Last » Next »