Sciweavers

3370 search results - page 351 / 674
» Correlation Embedding Analysis
Sort
View
ICASSP
2008
IEEE
15 years 10 months ago
On security-aware transmission scheduling
The problem of interest is to characterize to what extent nodes independently following certain transmission schedules can be hijacked to relay flows of information packets. Info...
Ting He, Ameya Agaskar, Lang Tong
134
Voted
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
15 years 10 months ago
Granularity Conscious Modeling for Probabilistic Databases
The convergence of embedded sensor systems and stream query processing suggests an important role for database techniques, in managing data that only partially – and often inacc...
Eirinaios Michelakis, Daisy Zhe Wang, Minos N. Gar...
GLOBECOM
2006
IEEE
15 years 9 months ago
Multiple-Hop Routing Based on the Pulse-Position Modulation Header Processing Scheme in All-Optical Ultrafast Packet Switching N
— In this paper we present modeling and simulation of multiple-hop all-optical packet routing based on the pulseposition modulation header processing (PPM-HP) scheme in ultrafast...
Hoa Le Minh, Zabih Ghassemlooy, Wai Pang Ng
RTAS
2006
IEEE
15 years 9 months ago
On Non-Utilization Bounds for Arbitrary Fixed Priority Policies
Prior research on schedulability bounds focused primarily on bounding utilization as a means to meet deadline constraints. Non-trivial bounds were found for a handful of schedulin...
Xue Liu, Tarek F. Abdelzaher
IWIA
2005
IEEE
15 years 9 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham