Sciweavers

12493 search results - page 2438 / 2499
» Information Access in the Web
Sort
View
SACMAT
2009
ACM
15 years 7 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
SIGCOMM
2009
ACM
15 years 7 months ago
mango: low-cost, scalable delivery of rich content on mobiles
We present mango, a low-cost and highly scalable content-delivery service for mobile phones. The service is targeted at emerging countries such as India where users are highly pri...
Ankur Jain, Sharad Jaiswal, Anirban Majumder, K. V...
GLOBECOM
2008
IEEE
15 years 7 months ago
Optimal LLR Clipping Levels for Mixed Hard/Soft Output Detection
Abstract—Consider a communications system where the detector generates a mix of hard and soft outputs, which are then fed into a soft-input channel decoder. In such a setting, it...
Ernesto Zimmermann, David L. Milliner, John R. Bar...
ICC
2008
IEEE
120views Communications» more  ICC 2008»
15 years 7 months ago
Near-Optimum Soft-Output Ant-Colony-Optimization Based Multiuser Detection for the DS-CDMA Uplink
— In this contribution, a novel soft-output Ant Colony Optimization (ACO) based Multi-User Detector (MUD) is proposed for the synchronous Direct-Sequence Code-DivisionMultiple-Ac...
Chong Xu, Lie-Liang Yang, Robert G. Maunder, Lajos...
INFOCOM
2008
IEEE
15 years 7 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
« Prev « First page 2438 / 2499 Last » Next »