Sciweavers

198 search results - page 27 / 40
» An Effective Characterization of Computability in Anonymous ...
Sort
View
BROADNETS
2007
IEEE
15 years 4 months ago
Pricing spectrum access in cellular CDMA networks with heterogeneous demand
—We consider pricing secondary access to wireless spectrum in cellular CDMA networks. We study the case for a primary license holder interested in leasing the right of providing ...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
92
Voted
IEEECIT
2009
IEEE
14 years 7 months ago
Dynamic Adaptation of the Master-Worker Paradigm
Abstract--The size, heterogeneity and dynamism of the execution platforms of scientific applications, like computational grids, make using those platforms complex. Furthermore, tod...
Françoise André, Guillaume Gauvrit, ...
DSN
2008
IEEE
15 years 4 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
ICDCS
2012
IEEE
13 years 10 hour ago
NEAT: Road Network Aware Trajectory Clustering
—Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean di...
Binh Han, Ling Liu, Edward Omiecinski
DSN
2008
IEEE
15 years 4 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...