Sciweavers

1652 search results - page 270 / 331
» Matching Vector Codes
Sort
View
SAC
2010
ACM
15 years 6 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
GLOBECOM
2009
IEEE
15 years 6 months ago
Linear Beamforming for Multiuser MIMO Downlink Systems with Channel Orthogonalization
— Recently linear processing strategies have been developed to approach the optimum performance of dirty paper coding with low complexity in multiuser multiple-input multipleoutp...
Jin-Sung Kim, Sung Hyun Moon, Inkyu Lee
ICC
2008
IEEE
107views Communications» more  ICC 2008»
15 years 5 months ago
Minimum BER Transmit Beamforming for MIMO-OFDM Systems with Finite Rate Feedback
— In this paper, we consider minimum bit error rate (BER) beamforming (BF) for multiple–input multiple–output orthogonal frequency division multiplexing (MIMO–OFDM) systems...
Yang-wen Liang, Robert Schober, Wolfgang H. Gersta...
ICISS
2007
Springer
15 years 5 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
WAPCV
2007
Springer
15 years 5 months ago
Reinforcement Learning for Decision Making in Sequential Visual Attention
The innovation of this work is the provision of a system that learns visual encodings of attention patterns and that enables sequential attention for object detection in real world...
Lucas Paletta, Gerald Fritz