Sciweavers

4955 search results - page 771 / 991
» Multiple Pattern Databases
Sort
View
102
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware
—We design and implement Soft-TDMAC, a software Time Division Multiple Access (TDMA) based MAC protocol, running over commodity 802.11 hardware. Soft-TDMAC has a synchronization ...
Petar Djukic, Prasant Mohapatra
110
Voted
IPPS
2009
IEEE
15 years 9 months ago
Application profiling on Cell-based clusters
In this paper, we present a methodology for profiling parallel applications executing on the IBM PowerXCell 8i (commonly referred to as the “Cell” processor). Specifically, we...
Hikmet Dursun, Kevin J. Barker, Darren J. Kerbyson...
ICTIR
2009
Springer
15 years 9 months ago
Modeling Expected Utility of Multi-session Information Distillation
Abstract. An open challenge in information distillation is the evaluation and optimization of the utility of ranked lists with respect to flexible user interactions over multiple ...
Yiming Yang, Abhimanyu Lad
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 9 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
RAID
2009
Springer
15 years 9 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...