Sciweavers

514 search results - page 23 / 103
» Packet Classification Algorithms: From Theory to Practice
Sort
View
MOBIHOC
2005
ACM
14 years 7 months ago
Link-layer salvaging for making routing progress in mobile ad hoc networks
IEEE 802.11 MAC, called the Distributed Coordination Function (DCF), employs carrier sensing to effectively avoid collisions, but this makes it difficult to maximally reuse the sp...
Chansu Yu, Kang G. Shin, Lubo Song
CCS
2011
ACM
12 years 7 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ICASSP
2008
IEEE
14 years 2 months ago
A pattern classification framework for theoretical analysis of component forensics
Component forensics is an emerging methodology for forensic analysis that aims at estimating the algorithms and parameters in each component of a digital device. This paper propos...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
13 years 7 months ago
Necessary and sufficient conditions for success of the nuclear norm heuristic for rank minimization
Minimizing the rank of a matrix subject to constraints is a challenging problem that arises in many applications in control theory, machine learning, and discrete geometry. This c...
Benjamin Recht, Weiyu Xu, Babak Hassibi
RTAS
1999
IEEE
13 years 12 months ago
Scalable Scheduling Support for Loss and Delay Constrained Media Streams
Real-time media servers need to service hundreds and, possibly, thousands of clients, each with their own quality of service (QoS) requirements. To guarantee such diverse QoS requ...
Richard West, Karsten Schwan, Christian Poellabaue...