Sciweavers

1296 search results - page 249 / 260
» Exploiting communication concurrency on high performance com...
Sort
View
CCS
2007
ACM
15 years 5 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
TWC
2008
85views more  TWC 2008»
14 years 10 months ago
Improved BDFE Using A Priori Information for Turbo Equalization
Abstract-- Turbo equalization improves communication system performance by iteratively exchanging information between soft-input soft-output (SISO) equalizer and SISO channel decod...
Jingxian Wu, Sang-Yick Leong, Kah-Ping Lee, Chengs...
NETGAMES
2004
ACM
15 years 4 months ago
Lightweight QoS-support for networked mobile gaming
In this paper, we present an approach to provide Quality of Service (QoS) for networked mobile gaming. In order to examine the QoS requirements of mobile games, we ported a simple...
Marcel Busse, Bernd Lamparter, Martin Mauve, Wolfg...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 11 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
67
Voted
ITC
1998
IEEE
94views Hardware» more  ITC 1998»
15 years 3 months ago
A method of serial data jitter analysis using one-shot time interval measurements
A method for measuring inter-symbol interference, duty cycle distortion, random jitter and periodic jitter is described. The Blackman-Tukey method of signal analysis is used. This...
Jan B. Wilstrup