Sciweavers

1358 search results - page 184 / 272
» Diverse Firewall Design
Sort
View
SRDS
2007
IEEE
15 years 6 months ago
Framework for Intrusion Tolerant Certification Authority System Evaluation
Various intrusion tolerant certification authority (CA) systems have been recently proposed to provide attack resistant certificate update/query services. However, it is difficult...
Jingqiang Lin, Jiwu Jing, Peng Liu
VTC
2007
IEEE
124views Communications» more  VTC 2007»
15 years 6 months ago
Near-Instantaneously Adaptive Cooperative Uplink Schemes Based on Space-Time Block Codes and V-Blast
- In this paper we propose two adaptive schemes for improving the achievable Bandwidth Efficiency (BE) of cooperative diversity aided wireless networks. These schemes are capable ...
Mohammed El-Hajjar, Salam A. Zummo, Lajos Hanzo
VTC
2007
IEEE
192views Communications» more  VTC 2007»
15 years 6 months ago
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
Ertugrul Necdet Ciftcioglu, Özgür Gü...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 6 months ago
Informative performance metrics for dynamic optimisation problems
Existing metrics for dynamic optimisation are designed primarily to rate an algorithm’s overall performance. These metrics show whether one algorithm is better than another, but...
Stefan Bird, Xiaodong Li
CCGRID
2006
IEEE
15 years 6 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...