Sciweavers

552 search results - page 59 / 111
» Reducing Time Complexity in RFID Systems
Sort
View
JCM
2006
112views more  JCM 2006»
13 years 8 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
ICDIM
2008
IEEE
14 years 2 months ago
Dynamic detection and administration of materialized views based on the Query Graph Model
Database Management Systems (DBMS) are complex software systems which are used in an increasing number of applications. To obtain the best performance for business relevant applic...
Andreas Lübcke, Ingolf Geist, Ronny Bubke
ICPR
2008
IEEE
14 years 2 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
ICSE
2009
IEEE-ACM
13 years 5 months ago
Software Assumptions Failure Tolerance: Role, Strategies, and Visions
Abstract. At our behest or otherwise, while our software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. Wh...
Vincenzo De Florio
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 2 months ago
Evaluation of Grouping Strategies for an Hierarchical SDMA/TDMA Scheduling Process
Abstract— Adding SDMA capabilities to modern wireless communication systems like IEEE 802.16 WiMAX promises high system capacity gains but raises the problem of combining orthogo...
Christian Hoymann, Jan Ellenbeck, Ralf Pabst, Marc...