Sciweavers

CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 8 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 8 months ago
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
In this paper, a reliability analysis is carried out to state a performance comparison between two recently proposed proactive routing algorithms. These protocols are able to scale...
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paur...
CORR
2008
Springer
124views Education» more  CORR 2008»
13 years 8 months ago
High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding
Abstract--Cooperative transmission is an emerging communication technique that takes advantage of the broadcast nature of wireless channels. However, due to low spectral efficiency...
Zhu Han, Xin Zhang, H. Vincent Poor
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 8 months ago
Well-definedness of Streams by Transformation and Termination
Streams are infinite sequences over a given data type. A stream specification is a set of equations intended to define a stream. We propose a transformation from such a stream spec...
Hans Zantema
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
Spanners of Additively Weighted Point Sets
Prosenjit Bose, Paz Carmi, Mathieu Couture
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 8 months ago
An Empirical Study on Content Bundling in BitTorrent Swarming System
Despite the tremendous success of BitTorrent, its swarming system suffers from a fundamental limitation: lower or no availability of unpopular contents. Recently, Menasche et al. ...
Jinyoung Han, Taejoong Chung, Seungbae Kim, Hyunch...
CORR
2010
Springer
80views Education» more  CORR 2010»
13 years 8 months ago
Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is introduced along with useful...
Jingge Zhu, Jianhua Mo, Meixia Tao
CORR
2008
Springer
135views Education» more  CORR 2008»
13 years 8 months ago
Crossing Borders: Security and Privacy Issues of the European e-Passport
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show...
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs,...
CORR
2008
Springer
94views Education» more  CORR 2008»
13 years 8 months ago
On the Weight Distribution of the Extended Quadratic Residue Code of Prime 137
The Hamming weight enumerator function of the formally self-dual even, binary extended quadratic residue code of prime p = 8m + 1 is given by Gleason's theorem for singly-eve...
Cen Tjhai, Martin Tomlinson, Marcel Ambroze, Moham...
CORR
2010
Springer
69views Education» more  CORR 2010»
13 years 8 months ago
Epistemic irrelevance in credal nets: the case of imprecise Markov trees
We focus on credal nets, which are graphical models that generalise Bayesian nets to imprecise probability. We replace the notion of strong independence commonly used in credal ne...
Gert de Cooman, Filip Hermans, Alessandro Antonucc...