Sciweavers

42 search results - page 4 / 9
» Windows of Vulnerability: A Case Study Analysis
Sort
View
ICDE
2012
IEEE
291views Database» more  ICDE 2012»
12 years 6 months ago
Efficiently Monitoring Top-k Pairs over Sliding Windows
Top-k pairs queries have received significant attention by the research community. k-closest pairs queries, k-furthest pairs queries and their variants are among the most well stu...
Zhitao Shen, Muhammad Aamir Cheema, Xuemin Lin, We...
SPEECH
2011
13 years 2 months ago
The importance of phase in speech enhancement
Typical speech enhancement methods, based on the short-time Fourier analysis-modification-synthesis (AMS) framework, modify only the magnitude spectrum and keep the phase spectru...
Kuldip K. Paliwal, Kamil K. Wójcicki, Benja...
GLOBECOM
2009
IEEE
13 years 10 months ago
Analysis of Asynchronous Multi-Packet Reception in 802.11 Distributed Wireless Networks
— This paper proposes a mathematical framework for evaluating the throughput of an 802.11 Distributed Wireless Network (DWN) when the system allows Multi-Packet Reception (MPR) i...
Fulvio Babich, Massimiliano Comisso
DAGSTUHL
2004
13 years 8 months ago
The Priority R-Tree: A Practically Efficient and Worst-Case-Optimal R-Tree
We present the Priority R-tree, or PR-tree, which is the first R-tree variant that always answers a window query using O((N/B)1-1/d + T/B) I/Os, where N is the number of ddimensio...
Lars Arge, Mark de Berg, Herman J. Haverkort, Ke Y...
DIMVA
2007
13 years 8 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...