Sciweavers

548 search results - page 80 / 110
» On the Limitations of Power Macromodeling Techniques
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
VTC
2006
IEEE
117views Communications» more  VTC 2006»
14 years 2 months ago
Frequency-Domain Eigenbeam-SDM and Equalization for High Speed Data Transmissions
— In wireless communications, the channel consists of many resolvable paths with different time delays, resulting in a severely frequency-selective fading channel. The frequencyd...
Kazuyuki Ozaki, Akinori Nakajima, Fumiyuki Adachi
MINENET
2006
ACM
14 years 2 months ago
Toward sophisticated detection with distributed triggers
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...
PPOPP
2006
ACM
14 years 2 months ago
Proving correctness of highly-concurrent linearisable objects
We study a family of implementations for linked lists using finegrain synchronisation. This approach enables greater concurrency, but correctness is a greater challenge than for ...
Viktor Vafeiadis, Maurice Herlihy, Tony Hoare, Mar...
DATE
2005
IEEE
155views Hardware» more  DATE 2005»
14 years 2 months ago
Studying Storage-Recomputation Tradeoffs in Memory-Constrained Embedded Processing
Fueled by an unprecedented desire for convenience and self-service, consumers are embracing embedded technology solutions that enhance their mobile lifestyles. Consequently, we wi...
Mahmut T. Kandemir, Feihui Li, Guilin Chen, Guangy...