Sciweavers

391 search results - page 61 / 79
» Requirements Elicitation Using a Combination of Prototypes a...
Sort
View
EUROSYS
2006
ACM
14 years 6 months ago
Database replication policies for dynamic content applications
The database tier of dynamic content servers at large Internet sites is typically hosted on centralized and expensive hardware. Recently, research prototypes have proposed using d...
Gokul Soundararajan, Cristiana Amza, Ashvin Goel
ACSAC
2007
IEEE
14 years 3 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
ADHOCNOW
2008
Springer
14 years 3 months ago
Self-interference in Multi-hop Wireless Chains: Geometric Analysis and Performance Study
Abstract. In the presence of interference, two single hop links can interact in a number of different ways, exhibiting significantly different behavior. In this paper, we consid...
Saquib Razak, Nael B. Abu-Ghazaleh
TASE
2007
IEEE
14 years 3 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
VTC
2007
IEEE
150views Communications» more  VTC 2007»
14 years 3 months ago
Effects of Non-Ideal Channel Feedback on Dual-Stream MIMO-OFDMA System Performance
— In this paper we analyze the downlink OFDMA system-level performances of a 2x2 dual-stream MIMO multiuser transmission scheme under the assumptions of partial and noisy channel...
István Z. Kovács, Klaus I. Pedersen,...