Sciweavers

1332 search results - page 180 / 267
» ideas 2008
Sort
View
ICC
2009
IEEE
112views Communications» more  ICC 2009»
15 years 10 months ago
Towards Secure Spectrum Decision
—The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistic...
Goce Jakimoski, K. P. Subbalakshmi
ADAEUROPE
2009
Springer
15 years 10 months ago
An Experience on Ada Programming Using On-Line Judging
Abstract. Ada has proved to be one of the best languages to learn computer programming. Nevertheless, learning to program is difficult and when it is combined with lack of motivati...
Francisco J. Montoya-Dato, José Luis Fern&a...
FSTTCS
2009
Springer
15 years 10 months ago
Iterative Methods in Combinatorial Optimization
We describe a simple iterative method for proving a variety of results in combinatorial optimization. It is inspired by Jain’s iterative rounding method (FOCS 1998) for designing...
R. Ravi
ACHI
2008
IEEE
15 years 10 months ago
Turning Web 2.0 Social Software into Versatile Collaborative Learning Solutions
—In the framework of the European Integrated Project PALETTE, the École Polytechnique Fédérale de Lausanne (EPFL) is developing the eLogbook Web 2.0 social software. The purpo...
Denis Gillet, Sandy El Helou, Chiu-Man Yu, Christo...
ACSAC
2008
IEEE
15 years 10 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode