Sciweavers

530 search results - page 94 / 106
» Practical Threshold Signatures
Sort
View
PKDD
2010
Springer
153views Data Mining» more  PKDD 2010»
13 years 5 months ago
A Robustness Measure of Association Rules
Abstract. We propose a formal definition of the robustness of association rules for interestingness measures. It is a central concept in the evaluation of the rules and has only be...
Yannick Le Bras, Patrick Meyer, Philippe Lenca, St...
GLOBECOM
2009
IEEE
13 years 5 months ago
CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing
Collaborative spectrum sensing in cognitive radio networks has been proposed as an efficient way to improve the performance of primary users detection. In collaborative spectrum se...
Wenkai Wang, Husheng Li, Yan Sun, Zhu Han
TON
2010
198views more  TON 2010»
13 years 2 months ago
On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
Abstract-- In this paper, we are interested in wireless scheduling algorithms for the downlink of a single cell that can minimize the queue-overflow probability. Specifically, in a...
V. J. Venkataramanan, Xiaojun Lin
TWC
2011
232views more  TWC 2011»
13 years 2 months ago
Joint Detection of Primary Systems Using UWB Impulse Radios
Abstract—Regulation in Europe and Japan requires the implementation of detect-and-avoid (DAA) techniques in some bands for the coexistence of licensed primary systems and seconda...
Serhat Erküçük, Lutz H.-J. Lampe,...
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
13 years 11 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...