Sciweavers

367 search results - page 69 / 74
» iccs 2009
Sort
View
ICC
2009
IEEE
139views Communications» more  ICC 2009»
14 years 2 months ago
Ergodic Secrecy Capacity Region of the Fading Broadcast Channel
— We consider the fading broadcast channel from a secrecy point of view. In this channel, each user views the other user as an eavesdropper, and wants to keep its information as ...
Ersen Ekrem, Sennur Ulukus
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 2 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
ICC
2009
IEEE
123views Communications» more  ICC 2009»
14 years 2 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
ICC
2009
IEEE
106views Communications» more  ICC 2009»
14 years 2 months ago
Distributed ECN-Based Congestion Control
—Following the design philosophy of XCP, VCP is a router-assisted congestion protocol that intends to balance the efficiency and the fairness control in high Bandwidth-Delay Pro...
Xiaolong Li, Homayoun Yousefi'zadeh
ICC
2009
IEEE
152views Communications» more  ICC 2009»
13 years 5 months ago
System Spectral Efficiency and Stability of 3G Networks: A Comparative Study
CDMA2000, WCDMA and WiMAX are three widely used 3G technologies. Since they share the same goal, which is to provide broader coverage and higher throughput in 3G networks, an impar...
Yuehong Gao, Xin Zhang, Yuming Jiang, Jeong-woo Ch...