Sciweavers

8135 search results - page 1478 / 1627
» network 2008
Sort
View
159
Voted
CISIM
2008
IEEE
15 years 10 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
131
Voted
CISS
2008
IEEE
15 years 10 months ago
Resource and power costs in dynamic spectrum allocation
— We consider a network setting, where a single Service Provider (SP) provides wireless data services to a group of users in the downlink. The transmission model is similar to OF...
Joydeep Acharya, Roy D. Yates
132
Voted
CISS
2008
IEEE
15 years 10 months ago
Distributed detection in the presence of frequency offset and phase shift
— In this paper, we study the problem of distributed detection in the presence of unknown carrier frequency offset (CFO) and initial phase, the issue we encounter in the emerging...
Tao Wu, Qi Cheng
150
Voted
CISS
2008
IEEE
15 years 10 months ago
Achievable rates and training optimization for fading relay channels with memory
—In this paper, transmission over time-selective, flat fading relay channels is studied. It is assumed that channel fading coefficients are not known a priori. Transmission tak...
Sami Akin, Mustafa Cenk Gursoy
112
Voted
CISS
2008
IEEE
15 years 10 months ago
Interference management for multiuser two-way relaying
—We consider a multiuser two-way relay network where multiple pairs of users communicate with their pre-assigned partners, using a common intermediate relay node, in a twophase c...
Min Chen, Aylin Yener
« Prev « First page 1478 / 1627 Last » Next »