Sciweavers

5863 search results - page 1039 / 1173
» An evaluation of the TRIPS computer system
Sort
View
ISPASS
2008
IEEE
15 years 8 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
AH
2008
Springer
15 years 8 months ago
Locally Adaptive Neighborhood Selection for Collaborative Filtering Recommendations
Abstract. User-to-user similarity is a fundamental component of Collaborative Filtering (CF) recommender systems. In user-to-user similarity the ratings assigned by two users to a ...
Linas Baltrunas, Francesco Ricci
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
SRDS
2007
IEEE
15 years 8 months ago
RAPID: Reliable Probabilistic Dissemination in Wireless Ad-Hoc Networks
In this paper, we propose a novel ReliAble ProbabIlistic Dissemination protocol, RAPID, for mobile wireless ad-hoc networks that tolerates message omissions, node crashes, and sel...
Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc S...
VTC
2007
IEEE
136views Communications» more  VTC 2007»
15 years 8 months ago
LDPC-Coded HARQ Throughput Performance of MC-CDMA Using ICI Cancellation
—Broadband packet data services are demanded in the next generation mobile communications systems. Multi-carrier CDMA (MC-CDMA) is considered to be a promising wireless technique...
Kaoru Fukuda, Akinori Nakajima, Fumiyuki Adachi
« Prev « First page 1039 / 1173 Last » Next »