Sciweavers

1236 search results - page 244 / 248
» fast 2010
Sort
View
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 8 months ago
Novel Mechanism to Defend DDoS Attacks Caused by Spam
Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protect...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
INFOCOM
2010
IEEE
13 years 8 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
ADC
2010
Springer
218views Database» more  ADC 2010»
13 years 6 months ago
Stock risk mining by news
Due to the fast delivery of news articles by news providers on the Internet and/or via news datafeeds, it becomes an important research issue of predicting the risk of stocks by u...
Qi Pan, Hong Cheng, Di Wu, Jeffrey Xu Yu, Yiping K...
CDC
2010
IEEE
160views Control Systems» more  CDC 2010»
13 years 5 months ago
Model-on-Demand predictive control for nonlinear hybrid systems with application to adaptive behavioral interventions
This paper presents a data-centric modeling and predictive control approach for nonlinear hybrid systems. System identification of hybrid systems represents a challenging problem b...
Naresh N. Nandola, Daniel E. Rivera
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
13 years 5 months ago
A distributed Newton method for Network Utility Maximization
Most existing work uses dual decomposition and subgradient methods to solve Network Utility Maximization (NUM) problems in a distributed manner, which suffer from slow rate of con...
Ermin Wei, Asuman E. Ozdaglar, Ali Jadbabaie