Sciweavers

6224 search results - page 1038 / 1245
» Recent Advances in Networking
Sort
View
JMLR
2010
185views more  JMLR 2010»
14 years 11 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
TDSC
2010
101views more  TDSC 2010»
14 years 11 months ago
Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense o...
Mi Kyung Han, Lili Qiu
TIT
2010
105views Education» more  TIT 2010»
14 years 11 months ago
Multigroup ML decodable collocated and distributed space-time block codes
In this paper, collocated and distributed space-time block codes (DSTBCs) which admit multigroup maximum-likelihood (ML) decoding are studied. First, the collocated case is conside...
G. Susinder Rajan, B. Sundar Rajan
TON
2010
127views more  TON 2010»
14 years 11 months ago
Approximation Algorithms for Wireless Link Scheduling With SINR-Based Interference
In this paper, we consider the classical problem of link scheduling in wireless networks under an accurate interference model, in which correct packet reception at a receiver node ...
Douglas M. Blough, Giovanni Resta, Paolo Santi
ICASSP
2011
IEEE
14 years 8 months ago
Pricing game and evolution dynamics for mobile video streaming
The recent developments of smart mobile phones and 3G networks enable users to enjoy video programs by subscribing to data plans. Due to phone-to-phone communication technologies ...
Wan-Yi Sabrina Lin, K. J. Ray Liu
« Prev « First page 1038 / 1245 Last » Next »