Sciweavers

5948 search results - page 1015 / 1190
» Computing Robust Counter-Strategies
Sort
View
123
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
IROS
2006
IEEE
111views Robotics» more  IROS 2006»
15 years 9 months ago
A Delay-tolerant, Potential field-based, Network Implementation of an Integrated Navigation System
Abstract—Network controllers (NCs) are devices that are capable of converting dynamic, spatially extended, and functionally specialized modules into a taskable goal-oriented grou...
Rachana Ashok Gupta, Ahmad A. Masoud, Mo-Yuen Chow
125
Voted
TRIDENTCOM
2006
IEEE
15 years 9 months ago
Light-trail testbed for metro optical networks
— Telecommunication networks have rapidly added staggering amounts of capacity to their long haul networks at low costs per bit using DWDM technologies. Concurrently, there has b...
Nathan A. VanderHorn, Srivatsan Balasubramanian, M...
VTC
2006
IEEE
156views Communications» more  VTC 2006»
15 years 9 months ago
Adaptive MBER Space-Time DFE Assisted Multiuser Detection for SDMA Systems
In this contribution we propose a space-time decision feedback equalization (ST-DFE) assisted multiuser detection (MUD) scheme for multiple antenna aided space division multiple a...
Sheng Chen, Andy Livingstone, Lajos Hanzo
134
Voted
VTC
2006
IEEE
160views Communications» more  VTC 2006»
15 years 9 months ago
Chip-interleaved Multi-rate CDMA with 2-dimensional OVSF Spreading
—Chip interleaving technique has been proposed for DS-CDMA to eliminate the multiple-access interference (MAI). In this paper, we develop this technique to provide the single- or...
Le Liu, Fumiyuki Adachi
« Prev « First page 1015 / 1190 Last » Next »