Sciweavers

5329 search results - page 990 / 1066
» The Weighted Majority Algorithm
Sort
View
158
Voted
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 9 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
143
Voted
MICRO
2008
IEEE
113views Hardware» more  MICRO 2008»
15 years 9 months ago
From SODA to scotch: The evolution of a wireless baseband processor
With the multitude of existing and upcoming wireless standards, it is becoming increasingly difficult for hardware-only baseband processing solutions to adapt to the rapidly chan...
Mark Woh, Yuan Lin, Sangwon Seo, Scott A. Mahlke, ...
123
Voted
RTAS
2008
IEEE
15 years 9 months ago
A Hybrid DVS Scheme for Interactive 3D Games
Interactive 3D games are now widely available on a variety of mobile devices for which battery-life is a major concern. Many of these devices support voltage/frequencyscalable pro...
Yan Gu, Samarjit Chakraborty
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 9 months ago
QoS Aware Dynamic Flow Control in Virtual Private Network
— In recent years, IP based Virtual Private Networks (IP-VPNs) which enables enterprises to dynamically create and manage privately owned virtual networks over the public network...
Fariza Sabrina, Glynn Rogers
124
Voted
CAV
2007
Springer
108views Hardware» more  CAV 2007»
15 years 8 months ago
Systematic Acceleration in Regular Model Checking
Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as finite words over a finite alphabet, where regular ...
Bengt Jonsson, Mayank Saksena