Sciweavers

COMCOM
2008
91views more  COMCOM 2008»
13 years 9 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CORR
2010
Springer
200views Education» more  CORR 2010»
13 years 9 months ago
Unified Compression-Based Acceleration of Edit-Distance Computation
The edit distance problem is a classical fundamental problem in computer science in general, and in combinatorial pattern matching in particular. The standard dynamic programming s...
Danny Hermelin, Gad M. Landau, Shir Landau, Oren W...
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 9 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 9 months ago
Efficient and exact sampling of simple graphs with given arbitrary degree sequence
Uniform sampling from graphical realizations of a given degree sequence is a fundamental component in simulation-based measurements of network observables, with applications rangi...
Charo I. Del Genio, Hyunju Kim, Zoltán Toro...
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 9 months ago
Adaptive Bound Optimization for Online Convex Optimization
We introduce a new online convex optimization algorithm that adaptively chooses its regularization function based on the loss functions observed so far. This is in contrast to pre...
H. Brendan McMahan, Matthew J. Streeter
CORR
2010
Springer
60views Education» more  CORR 2010»
13 years 9 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 9 months ago
Towards an Efficient Tile Matrix Inversion of Symmetric Positive Definite Matrices on Multicore Architectures
The algorithms in the current sequential numerical linear algebra libraries (e.g. LAPACK) do not parallelize well on multicore architectures. A new family of algorithms, the tile a...
Emmanuel Agullo, Henricus Bouwmeester, Jack Dongar...
CN
2008
117views more  CN 2008»
13 years 9 months ago
Broker-placement in latency-aware peer-to-peer networks
In large peer-to-peer (P2P) overlay networks, nodes usually share resources to support all kinds of applications. In such networks, a subset of the nodes may assume the role of br...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
CN
2008
96views more  CN 2008»
13 years 9 months ago
Deadline-based scheduling in support of real-time data delivery
The use of deadline-based scheduling in support of real-time delivery of application data units (ADUs) in a packet-switched network is investigated. Of interest is priority schedu...
Yanni Ellen Liu, Johnny W. Wong
CN
2008
63views more  CN 2008»
13 years 9 months ago
Time-efficient distributed layer-2 auto-configuration for cognitive radio networks
Cognitive radios (CR) have the ability to dynamically adapt to local spectrum availability. In a network comprised of CR-enabled devices, layer-2 auto-configuration involves deter...
Srinivasan Krishnamurthy, Mansi Ramakrishnan Thopp...