Sciweavers

1190 search results - page 114 / 238
» Enhancing Sharing for Precision
Sort
View
155
Voted
IEEEIA
2009
15 years 2 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
161
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Cooperative sensing with sequential ordered transmissions to secondary fusion center
Successful spectrum sharing in a cognitive radio network depends on the correct and quick detection of primary activity. Cooperative spectrum sensing is therefore suggested to enh...
Laila Hesham, Ahmed Sultan, Mohammed Nafie, Fadel ...
SAC
2009
ACM
15 years 11 months ago
An implementation of the earliest deadline first algorithm in Linux
Recently, many projects have been started to introduce some real-time mechanisms into general purpose operating systems (GPOS) in order to make them capable of providing the users...
Dario Faggioli, Michael Trimarchi, Fabio Checconi
ICDM
2009
IEEE
155views Data Mining» more  ICDM 2009»
15 years 11 months ago
Stacked Gaussian Process Learning
—Triggered by a market relevant application that involves making joint predictions of pedestrian and public transit flows in urban areas, we address the question of how to utili...
Marion Neumann, Kristian Kersting, Zhao Xu, Daniel...
INTETAIN
2009
Springer
15 years 11 months ago
Entertainment Computing, Social Transformation and the Quantum Field
Abstract. Entertainment computing is on its way getting an established academic discipline. The scope of entertainment computing is quite broad (see the scope of the international ...
Matthias Rauterberg