Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
RAID
2015
Springer
5 years 7 months ago
Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors
In this paper, we present the design and implementation of Haetae, a high-performance Suricata-based NIDS on many-core processors (MCPs). Haetae achieves high performance with thre...
Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Don...
RAID
2015
Springer
5 years 7 months ago
HelDroid: Dissecting and Detecting Mobile Ransomware
In ransomware attacks, the actual target is the human, as opposed to the classic attacks that abuse the infected devices (e.g., botnet renting, information stealing). Mobile device...
Nicoló Andronio, Stefano Zanero, Federico M...
QSHINE
2015
IEEE
5 years 7 months ago
Using joint Particle Swarm Optimization and Genetic Algorithm for resource allocation in TD-LTE systems
—This paper presents a joint radio resource allocation scheme in LTE/LTE-A systems. In order to maximize system throughput while satisfying the minimum user rate requirement, the...
Jianbo Du, Liqiang Zhao, Jie Xin, Jen-Ming Wu, Jie...
QSHINE
2015
IEEE
5 years 7 months ago
A multi-level system for sequential update summarization
Chunyun Zhang, Zhanyu Ma, Jiayue Zhang, Weiran Xu,...
QSHINE
2015
IEEE
5 years 7 months ago
Multihop uncoordinated cooperative forwarding in highly dynamic networks
—This paper investigates cooperative forwarding in large highly dynamic wireless networks. Unlike traditional coordinated cooperative forwarding schemes that require a large amou...
Xuefei Zhang, Guoqiang Mao, Xiaofeng Tao, Qimei Cu...
QSHINE
2015
IEEE
5 years 7 months ago
A joint beamforming based SDMA protocol for IEEE 802.11n downlink
—To support space division multiple access (SDMA) in the IEEE 802.11n downlink, a joint beamforming based MAC protocol, J-MAC is presented in this paper. An access point (AP) fol...
Cheng Guo, Liqiang Zhao, Hui Zhao, Whai-En Chen
QSHINE
2015
IEEE
5 years 7 months ago
To random access or schedule? Optimum 3GPP licensed-assisted access for machine-to-machine communications
To support various Internet-of-Thing (loT) applica­ tions involving an enormous number of machine-type devices, deploying LTEILTE-A networks on ISM bands with an exten­ sive band...
Shao-Yu Lien, Yueh Jir Wang
QSHINE
2015
IEEE
5 years 7 months ago
PFCS: Pre-buffering-aware flow control scheme for LTE-advanced relay networks
—Relay technology is one of the techniques proposed to enhance the capacity of Long Term Evolution-Advanced (LTEA) networks. In an LTE-A relay network, each serving relay node ha...
Ping-Chen Lin, Ray-Guang Cheng, Xian Wang, Putu Ay...
QSHINE
2015
IEEE
5 years 7 months ago
Array antennas based joint beamforming for IEEE 802.11n Wi-Fi
—In order to achieve array gain and spatial diversity or multiplexing gain simultaneously, a novel joint beamforming based on MIMO and array antenna techniques, referred to as JB...
Cheng Guo, Liqiang Zhao, Whai-En Chen
PERCOM
2015
ACM
5 years 7 months ago
Averting the privacy risks of smart metering by local data preprocessing
More and more renewable sources are integrated into electric power grids worldwide. Their high generation dynamics, however, require power grid operators to monitor electricity ge...
Andreas Reinhardt, Frank Englert, Delphine Christi...
books