Sciweavers

375 search results - page 43 / 75
» Accessible Capacity of Secondary Users
Sort
View
90
Voted
ACSAC
1998
IEEE
15 years 2 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
91
Voted
GLOBECOM
2009
IEEE
15 years 5 months ago
On Spectrum Selection Games in Cognitive Radio Networks
Abstract—Cognitive Radio Networks aim at enhancing spectrum utilization by allowing cognitive devices to opportunistically access vast portions of the spectrum. To reach such amb...
Ilaria Malanchini, Matteo Cesana, Nicola Gatti
121
Voted
CORR
2011
Springer
210views Education» more  CORR 2011»
14 years 5 months ago
Online Learning of Rested and Restless Bandits
In this paper we study the online learning problem involving rested and restless multiarmed bandits with multiple plays. The system consists of a single player/user and a set of K...
Cem Tekin, Mingyan Liu
76
Voted
USENIX
1993
14 years 11 months ago
HighLight: Using a Log-structured File System for Tertiary Storage Management
Robotic storage devices offer huge storage capacity at a low cost per byte, but with large access times. Integrating these devices into the storage hierarchy presents a challenge ...
John T. Kohl, Carl Staelin, Michael Stonebraker
102
Voted
TIT
2002
90views more  TIT 2002»
14 years 9 months ago
Optimal sequences for CDMA under colored noise: A Schur-saddle function property
We consider direct sequence code division multiple access (DS-CDMA), modeling interference from users communicating with neighboring base stations by additive colored noise. We con...
Pramod Viswanath, Venkat Anantharam