Sciweavers

1523 search results - page 174 / 305
» Detecting and Sketching the Common
Sort
View
AICT
2009
IEEE
172views Communications» more  AICT 2009»
15 years 4 months ago
A Practical Characterization of 802.11 Access Points in Paris
Unlike other wireless technologies, the deployment of 802.11 networks is not limited to operators: access points can easily be installed by end-users for domestic use. This singul...
Guillaume Valadon, Florian Le Goff, Christophe Ber...
ICSE
2009
IEEE-ACM
15 years 4 months ago
Mining exception-handling rules as sequence association rules
Programming languages such as Java and C++ provide exception-handling constructs to handle exception conditions. Applications are expected to handle these exception conditions and...
Suresh Thummalapenta, Tao Xie
ICASSP
2009
IEEE
15 years 4 months ago
On the performance of semidefinite relaxation MIMO detectors for QAM constellations
Due to their computational efficiency and strong empirical performance, semidefinite relaxation (SDR)–based algorithms have gained much attention in multiple–input multiple...
Anthony Man-Cho So
DEXA
2009
Springer
167views Database» more  DEXA 2009»
15 years 4 months ago
Analyses and Validation of Conditional Dependencies with Built-in Predicates
Abstract. This paper proposes a natural extension of conditional functional dependencies (cfds [14]) and conditional inclusion dependencies (cinds [8]), denoted by cfdp s and cindp...
Wenguang Chen, Wenfei Fan, Shuai Ma
ACSAC
2008
IEEE
15 years 4 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...