Sciweavers

10577 search results - page 2090 / 2116
» Active Data Mining
Sort
View
GLOBECOM
2009
IEEE
15 years 1 months ago
Effective Capacity Analysis of Cognitive Radio Channels for Quality of Service Provisioning
In this paper, cognitive transmission under quality of service (QoS) constraints is studied. In the cognitive radio channel model, it is assumed that the secondary transmitter sen...
Sami Akin, Mustafa Cenk Gursoy
ESAS
2004
Springer
15 years 1 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
ACSAC
2003
IEEE
15 years 1 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
INFOCOM
1989
IEEE
15 years 1 months ago
An Efficient Multiple-Access Method for the Binary Adder Channel
Consider M - HChoose P - T communications: T users or less, out of M potential users, are chosen at random to simultaneously transmit binary data over a common channel. A method f...
Israel Bar-David, Eli Plotnik, Raphael Rom
LISA
2008
15 years 1 days ago
Sysman: A Virtual File System for Managing Clusters
Sysman is a system management infrastructure for clusters and data centers similar to the /proc file system. It provides a familiar yet powerful interface for the management of se...
Mohammad Banikazemi, David Daly, Bülent Abali
« Prev « First page 2090 / 2116 Last » Next »