Sciweavers

3238 search results - page 457 / 648
» Multi-return function call
Sort
View
121
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Learning to satisfy
This paper investigates a class of learning problems called learning satisfiability (LSAT) problems, where the goal is to learn a set in the input (feature) space that satisfies...
Frederic Thouin, Mark Coates, Brian Eriksson, Robe...
118
Voted
ICC
2008
IEEE
15 years 9 months ago
GORA: Goodput Optimal Rate Adaptation for 802.11 Using Medium Status Estimation
Abstract—Rate Adaptation for 802.11 has been deeply investigated in the past, but the problem of achieving optimal Rate Adaptation with respect not only to channel-related errors...
Nicola Baldo, Federico Maguolo, Simone Merlin, And...
240
Voted
ICCCN
2008
IEEE
15 years 9 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
INFOCOM
2008
IEEE
15 years 9 months ago
The Inframetric Model for the Internet
—A large amount of algorithms has recently been designed for the Internet under the assumption that the distance defined by the round-trip delay (RTT) is a metric. Moreover, man...
Pierre Fraigniaud, Emmanuelle Lebhar, Laurent Vien...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 9 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee