Sciweavers

80 search results - page 16 / 16
» Subgradient methods in network resource allocation: Rate ana...
Sort
View
NDSS
2006
IEEE
14 years 2 months ago
Modeling Botnet Propagation Using Time Zones
Time zones play an important and unexplored role in malware epidemics. To understand how time and location affect malware spread dynamics, we studied botnets, or large coordinated...
David Dagon, Cliff Changchun Zou, Wenke Lee
GLOBECOM
2006
IEEE
14 years 2 months ago
Adaptive MIMO-OFDM Cellular System with Soft Handover between Distributed Base Station Antennas
— The joint cooperative processing of transmitted signal from several multiple-input multiple-output (MIMO) base station (BS) antenna heads is considered for users located within...
Antti Tölli, Marian Codreanu, Markku J. Juntt...
NDSS
2008
IEEE
14 years 2 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
KER
2008
193views more  KER 2008»
13 years 8 months ago
The 1st international workshop on computational social choice
Computational social choice is a new discipline currently emerging at the interface of social choice theory and computer science. It is concerned with the application of computati...
Ulle Endriss
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 9 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...