Sciweavers

1361 search results - page 139 / 273
» Spaces of practice
Sort
View
132
Voted
RAID
2010
Springer
15 years 2 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
124
Voted
VTC
2010
IEEE
166views Communications» more  VTC 2010»
15 years 2 months ago
On Capacity-Maximizing Angular Densities of Multipath in MIMO Channels
– This paper provides a partial answer to the question: "what is the best angular density of multipath in MIMO channels?" using the size-asymptotic theory of Toeplitz m...
George Levin, Sergey Loyka
123
Voted
WDAG
2010
Springer
158views Algorithms» more  WDAG 2010»
15 years 2 months ago
Distributed Contention Resolution in Wireless Networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking
151
Voted
PIMRC
2010
IEEE
15 years 1 months ago
Vandermonde-subspace frequency division multiplexing receiver analysis
Abstract--Vandermonde-subspace frequency division multiplexing (VFDM) is a technique for interference cancellation in overlay networks that allows a secondary network to operate si...
Leonardo S. Cardoso, Francisco Rodrigo P. Cavalcan...
133
Voted
PODC
2010
ACM
15 years 1 months ago
Brief announcement: distributed contention resolution in wireless networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking