Sciweavers

4511 search results - page 632 / 903
» Observation Based System Security
Sort
View
188
Voted
CISS
2010
IEEE
14 years 7 months ago
On performance evaluation of cooperative spectrum sensing in cognitive radio networks
—This paper presents the system level performance evaluation for energy-detection based cooperative spectrum sensing in cognitive radio networks. Three performance criteria are q...
Gang Xiong, Shalinee Kishore, Aylin Yener
MOBISYS
2011
ACM
14 years 7 months ago
Opportunistic alignment of advertisement delivery with cellular basestation overloads
This paper is motivated by two observations: (1) cellular network operators are actively exploring advertisement delivery as a new means of revenue generation, and (2) cellular ba...
Ravi Kokku, Rajesh Mahindra, Sampath Rangarajan, H...
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
15 years 5 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
KBSE
2008
IEEE
15 years 10 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...
CODES
2003
IEEE
15 years 9 months ago
A codesigned on-chip logic minimizer
Boolean logic minimization is traditionally used in logic synthesis tools running on powerful desktop computers. However, logic minimization has recently been proposed for dynamic...
Roman L. Lysecky, Frank Vahid