Sciweavers

3910 search results - page 740 / 782
» Analyzing Cross-Connected Networks
Sort
View
RAID
2010
Springer
14 years 10 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
TCOM
2010
117views more  TCOM 2010»
14 years 10 months ago
Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty
Bidirectional relaying is a promising approach to improve the performance in wireless networks such as sensor, ad-hoc, and even cellular systems. Bidirectional relaying applies to...
Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. ...
TIFS
2010
186views more  TIFS 2010»
14 years 10 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
WS
2010
ACM
14 years 10 months ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...
GLOBECOM
2010
IEEE
14 years 9 months ago
Energy Saving Performance Comparison of Coordinated Multi-Point Transmission and Wireless Relaying
Currently, two cooperative transmission strategies, Coordinated Multi-Point (CoMP) Transmission and wireless relaying, are expected to be deployed in future cellular systems to imp...
Dongxu Cao, Sheng Zhou, Chao Zhang, Zhisheng Niu