Sciweavers

4307 search results - page 410 / 862
» Dynamic Spyware Analysis
Sort
View
IJSYSC
2010
97views more  IJSYSC 2010»
15 years 2 months ago
A stability study on first-order neutral systems with three rationally independent time delays
— First order linear time invariant and time delayed dynamics of neutral type is taken into account with three rationally independent delays. There are two main contributions of ...
Rifat Sipahi, Nejat Olgaç, Dimitri Breda
INFOCOM
2010
IEEE
15 years 2 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
PKDD
2010
Springer
152views Data Mining» more  PKDD 2010»
15 years 2 months ago
CET: A Tool for Creative Exploration of Graphs
We present a tool for interactive exploration of graphs that integrates advanced graph mining methods in an interactive visualization framework. The tool enables efficient explorat...
Stefan Haun, Andreas Nürnberger, Tobias K&oum...
SCL
2010
79views more  SCL 2010»
15 years 2 months ago
Teixeira singularities in 3D switched feedback control systems
This paper is concerned with the analysis of a singularity that can occur in threedimensional discontinuous feedback control systems. The singularity is the two-fold – a tangenc...
A. Colombo, Mario di Bernardo, Enric Fossas, M. R....
TCOM
2010
110views more  TCOM 2010»
15 years 2 months ago
Joint data QR-detection and Kalman estimation for OFDM time-varying Rayleigh channel complex gains
—This paper deals with the case of a high speed mobile receiver operating in an orthogonal-frequency-divisionmultiplexing (OFDM) communication system. Assuming the knowledge of d...
Hussein Hijazi, Laurent Ros