Sciweavers

33 search results - page 6 / 7
» Finding the Average Rates of Change in Repetitive Behavior
Sort
View
JSAC
2008
125views more  JSAC 2008»
13 years 5 months ago
Optimal Competitive Algorithms for Opportunistic Spectrum Access
We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter must...
Nicholas B. Chang, Mingyan Liu
ACISP
2009
Springer
13 years 10 months ago
Measurement Study on Malicious Web Servers in the .nz Domain
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages launch so-called drive-by-download attacks that are capable to gain complete contro...
Christian Seifert, Vipul Delwadia, Peter Komisarcz...
USS
2008
13 years 7 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
CODES
2008
IEEE
13 years 7 months ago
Profiling of lossless-compression algorithms for a novel biomedical-implant architecture
In view of a booming market for microelectronic implants, our ongoing research work is focusing on the specification and design of a novel biomedical microprocessor core targeting...
Christos Strydis, Georgi Gaydadjiev
WORM
2004
13 years 6 months ago
Preliminary results using scale-down to explore worm dynamics
A major challenge when attempting to analyze and model large-scale Internet phenomena such as the dynamics of global worm propagation is finding ate abstractions that allow us to ...
Nicholas Weaver, Ihab Hamadeh, George Kesidis, Ver...