Sciweavers

100 search results - page 19 / 20
» Optimal Decision Fusion for a Face Verification System
Sort
View
DSN
2009
IEEE
13 years 3 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
VTC
2006
IEEE
179views Communications» more  VTC 2006»
13 years 11 months ago
An Efficient Handover Scheme Based on Fast Mobile IPv6
— Handover of a call from wireless LAN (WLAN) to third generation cellular system and vice versa is one of the challenges faced by the integrated 3G-WLAN networks. Evolution of 3...
Shanthy Menezes, S. Venkatesan, Kwang-hyun Rho
INFOCOM
2010
IEEE
13 years 4 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ATAL
2005
Springer
13 years 11 months ago
An agent-based approach for managing symbiotic simulation of semiconductor assembly and test operation
The rapid changing business environment of high-tech asset intensive enterprises such as semiconductor manufacturing constantly drives production managers to look for better solut...
Malcolm Yoke-Hean Low, Kong Wei Lye, Peter Lenderm...
PIMRC
2008
IEEE
14 years 4 days ago
Channel state information based LLR clipping in list MIMO detection
—Suboptimal detection schemes, such as list MIMO detection, often face the challenge of having to “guess” at the decision reliability for some of the detected bits. A simple ...
David L. Milliner, Ernesto Zimmermann, John R. Bar...