Sciweavers

1084 search results - page 179 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Decode-and-Forward Cooperative Relay with Multi-User Detection in Uplink CDMA Networks
Abstract— The use of multi-user detection (MUD) in a cooperative CDMA network is investigated for the uplink in synchronous CDMA systems. Suppose that, at any instant in time, pa...
Wan-Jen Huang, Yao-Win Hong, C. C. Jay Kuo
TRIDENTCOM
2006
IEEE
14 years 1 months ago
Mapping Link SNRs of wireless mesh networks onto an indoor testbed
— As a platform for synergistic theory-experiment exploration in the field of wireless networking, wireless testbeds have been used to facilitate a broad range of research. From...
Jing Lei, Roy D. Yates, Larry J. Greenstein, Hang ...
GLOBECOM
2009
IEEE
13 years 11 months ago
Super-Gaussian Loading for Robust Beamforming
— It is well known that the performance of adaptive beamformers may degrade in the presence of steering errors. In this context, diagonal loading is one of the most popular metho...
Jing Gu, Patrick J. Wolfe
OSDI
2006
ACM
14 years 8 months ago
Operating System Profiling via Latency Analysis
Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavi...
Nikolai Joukov, Avishay Traeger, Rakesh Iyer, Char...
CIKM
2009
Springer
14 years 2 months ago
Independent informative subgraph mining for graph information retrieval
In order to enable scalable querying of graph databases, intelligent selection of subgraphs to index is essential. An improved index can reduce response times for graph queries si...
Bingjun Sun, Prasenjit Mitra, C. Lee Giles