Sciweavers

114 search results - page 21 / 23
» Reasoning over Networks by Symbolic Methods
Sort
View
VTC
2010
IEEE
127views Communications» more  VTC 2010»
13 years 5 months ago
Inter-Site Joint Detection with Reduced Backhaul Capacity Requirements for the 3GPP LTE Uplink
—Cellular networks operating with a frequency reuse factor of one are often interference-limited. For that reason, base station (BS) cooperation techniques aiming at mitigating t...
Philipp Frank, Andreas Müller, Joachim Speide...
TEC
2010
203views more  TEC 2010»
13 years 1 months ago
Niching Without Niching Parameters: Particle Swarm Optimization Using a Ring Topology
Niching is an important technique for multimodal optimization. Most existing niching methods require specification of certain niching parameters in order to perform well. These nic...
Xiaodong Li
TELSYS
2010
154views more  TELSYS 2010»
13 years 1 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 24 days ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
GIS
2007
ACM
14 years 7 months ago
TerraStream: from elevation data to watershed hierarchies
We consider the problem of extracting a river network and a watershed hierarchy from a terrain given as a set of irregularly spaced points. We describe TerraStream, a "pipeli...
Andrew Danner, Thomas Mølhave, Ke Yi, Panka...