Sciweavers

189 search results - page 23 / 38
» Performance Evaluation of QAM-Based BICM: An Analytical Appr...
Sort
View
CP
2007
Springer
14 years 1 months ago
On Universal Restart Strategies for Backtracking Search
Abstract. Constraint satisfaction and propositional satisfiability problems are often solved using backtracking search. Previous studies have shown that a technique called randomi...
Huayue Wu, Peter van Beek
22
Voted
MOBICOM
2004
ACM
14 years 29 days ago
Vehicle-to-vehicle safety messaging in DSRC
— This paper studies the design of layer-2 protocols for a vehicle to send safety messages to other vehicles. The target is to send vehicle safety messages with high reliability ...
Qing Xu 0007, Tony K. Mak, Jeff Ko, Raja Sengupta
ISSTA
2012
ACM
11 years 10 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
PERCOM
2010
ACM
13 years 9 months ago
Engineering energy-efficient target detection applications in Wireless Sensor Networks
This paper addresses the problem of engineering energy-efficient target detection applications using unattended Wireless Sensor Networks (WSNs) for long-lasting surveillance of are...
Paolo Medagliani, Jeremie Leguay, Vincent Gay, Mar...
FTCS
1997
100views more  FTCS 1997»
13 years 8 months ago
Discriminating Fault Rate and Persistency to Improve Fault Treatment
In this paper the consolidate identification of faults, distinguished as transient or permanent/intermittent, is approached. Transient faults discrimination has long been performe...
Andrea Bondavalli, Silvano Chiaradonna, Felicita D...