Sciweavers

876 search results - page 142 / 176
» Limits on the Usefulness of Random Oracles
Sort
View
ECCV
2010
Springer
15 years 4 months ago
Automatic Learning of Background Semantics in Generic Surveilled Scenes
Advanced surveillance systems for behavior recognition in outdoor traffic scenes depend strongly on the particular configuration of the scenario. Scene-independent trajectory analy...
Carles Fernández, Jordi Gonzàlez, Xavier Roca
102
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling
Abstract—We provide a formal model for the Change Management process for Enterprise IT systems, and develop change scheduling algorithms that seek to attain the “change capacit...
Praveen Kumar Muthuswamy, Koushik Kar, Sambit Sahu...
SIGOPS
2010
83views more  SIGOPS 2010»
14 years 11 months ago
Empirical evaluation of NAND flash memory performance
Reports of NAND flash device testing in the literature have for the most part been limited to examination of circuit-level parameters on raw flash chips or prototypes, and syste...
Peter Desnoyers
148
Voted
ICC
2009
IEEE
139views Communications» more  ICC 2009»
14 years 10 months ago
Impact of Topology and Shadowing on the Outage Probability of Cellular Networks
This paper proposes an analytical study of the shadowing impact on the outage probability in cellular radio networks. We establish that the downlink other-cell interference factor,...
Jean Marc Kelif, Marceau Coupechoux
INFOCOM
2011
IEEE
14 years 4 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...