Sciweavers

42 search results - page 7 / 9
» Revealing Packed Malware
Sort
View
COMSWARE
2008
IEEE
14 years 2 months ago
Location management area (LMA)-based MBS handover in mobile WiMAX systems
Abstract—Mobile WiMAX aims to provide multimedia multicast/broadcast service (MBS) as well as elastic data service. However, supporting delay sensitive applications like video/au...
Ji Hoon Lee, Taekyoung Kwon, Yanghee Choi, Sangheo...
ICOIN
2007
Springer
14 years 1 months ago
Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution
Construction of overlay networks without any consideration of real network topologies causes inefficient routing in peer-to-peer networks. This paper presents the design and evalua...
Kunwoo Park, Sangheon Pack, Taekyoung Kwon
VTC
2006
IEEE
141views Communications» more  VTC 2006»
14 years 1 months ago
Minimum Distance-Based Limited-Feedback Precoder for MIMO Spatial Multiplexing Systems
— Precoding is a well-known method to reach the promised performance and capacity of multiple-input multipleoutput (MIMO) systems. Recent investigations, when the transmitter has...
Alireza Ghaderipoor, Chintha Tellambura
VTC
2006
IEEE
166views Communications» more  VTC 2006»
14 years 1 months ago
TA-MAC: Task Aware MAC Protocol for Wireless Sensor Networks
Abstract— In wireless sensor networks (WSNs), reducing energy consumption of resource constrained sensor nodes is one of the most important issues. In this paper, we propose a ta...
Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, Yang...
USS
2008
13 years 9 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...