Sciweavers

690 search results - page 64 / 138
» Multi-Agent Only Knowing
Sort
View
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 3 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ICASSP
2008
IEEE
14 years 3 months ago
Compressed sensing with sequential observations
Compressed sensing allows perfect recovery of sparse signals (or signals sparse in some basis) using only a small number of measurements. The results in the literature have focuse...
Dmitry M. Malioutov, Sujay Sanghavi, Alan S. Wills...
NDSS
2008
IEEE
14 years 3 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 3 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
PIMRC
2008
IEEE
14 years 3 months ago
On the secrecy capacity of frequency-selective fading channels : A practical vandermonde precoding
We study the secrecy capacity of the frequency-selective wiretap channel. Assuming that a guard interval of L symbols is inserted to avoid the inter-block interference and these s...
Mari Kobayashi, Mérouane Debbah