Sciweavers

16128 search results - page 2995 / 3226
» Distributed network scheduling
Sort
View
CEC
2008
IEEE
15 years 9 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
CISS
2008
IEEE
15 years 9 months ago
Achievable rates and training optimization for fading relay channels with memory
—In this paper, transmission over time-selective, flat fading relay channels is studied. It is assumed that channel fading coefficients are not known a priori. Transmission tak...
Sami Akin, Mustafa Cenk Gursoy
CISS
2008
IEEE
15 years 9 months ago
Interference management for multiuser two-way relaying
—We consider a multiuser two-way relay network where multiple pairs of users communicate with their pre-assigned partners, using a common intermediate relay node, in a twophase c...
Min Chen, Aylin Yener
COMSWARE
2008
IEEE
15 years 9 months ago
An efficient and bandwidth sensitive parallel download scheme in data grids
—For modern scientific applications such as astrophysics, astronomy, aerography, and biology, a large amount of storage space is required because of the large-scale datasets. Dat...
Ruay-Shiung Chang, Chun-Fu Lin, Jiing-Hsing Ruey, ...
DATE
2008
IEEE
123views Hardware» more  DATE 2008»
15 years 9 months ago
Test Strategies for Low Power Devices
Ultra low-power devices are being developed for embedded applications in bio-medical electronics, wireless sensor networks, environment monitoring and protection, etc. The testing...
C. P. Ravikumar, M. Hirech, X. Wen
« Prev « First page 2995 / 3226 Last » Next »