Sciweavers

159 search results - page 22 / 32
» Classification schemes to aid in the analysis of real-time s...
Sort
View
76
Voted
ACSC
2006
IEEE
15 years 3 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
HICSS
2002
IEEE
100views Biometrics» more  HICSS 2002»
15 years 2 months ago
Coding Standards Benefiting Product and Service Information in E-commerce
E-Commerce can be streamlined if products and services are unambiguously identified with industryagreed XML tags through the coding of products and services according to standard ...
Alea M. Fairchild, Bruno de Vuyst
90
Voted
ISCAS
2007
IEEE
178views Hardware» more  ISCAS 2007»
15 years 3 months ago
On the Joint Compensation of IQ Imbalances and Phase Noise in MIMO-OFDM Systems
Abstract— OFDM systems are susceptible to receiver impairments such as IQ imbalance and phase noise. These impairments can severely degrade the achievable effective signalto-nois...
Qiyue Zou, Alireza Tarighat, Ali H. Sayed
ICC
2009
IEEE
117views Communications» more  ICC 2009»
15 years 4 months ago
Reduced-Rank Adaptive Least Bit Error-Rate Detection in Hybrid Direct-Sequence Time-Hopping Ultrawide Bandwidth Systems
— In this paper we consider the low-complexity detection in hybrid direct-sequence time-hopping ultrawide bandwidth (DS-TH UWB) systems. A reduced-rank adaptive LBER detector is ...
Qasim Zeeshan Ahmed, Lie-Liang Yang, Sheng Chen
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
15 years 11 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang