Sciweavers

2874 search results - page 485 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICC
2007
IEEE
172views Communications» more  ICC 2007»
15 years 6 months ago
Cell Mobility Based Admission Control for Wireless Networks with Link Adaptation
— Link adaptation is one of the key technologies used in high speed wireless networks such as HSDPA and mobile WiMAX. The dynamic feature of mobile users’ channel capacities br...
Jing Li, Srinivas Sampalli
SEFM
2005
IEEE
15 years 5 months ago
From RT-LOTOS to Time Petri Nets New Foundations for a Verification Platform
The formal description technique RT-LOTOS has been selected as intermediate language to add formality to a real-time UML profile named TURTLE. For this sake, an RT-LOTOS verificat...
Tarek Sadani, Pierre de Saqui-Sannes, Jean-Pierre ...
DRM
2005
Springer
15 years 5 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang
CIKM
2004
Springer
15 years 5 months ago
A framework for selective query expansion
Query expansion is a well-known technique that has been shown to improve average retrieval performance. This technique has not been used in many operational systems because of the...
Stephen Cronen-Townsend, Yun Zhou, W. Bruce Croft
MSR
2009
ACM
15 years 4 months ago
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code
As more and more open-source software components become available on the internet we need automatic ways to label and compare them. For example, a developer who searches for reusa...
Adrian Kuhn