Sciweavers

4985 search results - page 259 / 997
» Observation of String-Rewriting Systems
Sort
View
165
Voted
PERCOM
2007
ACM
16 years 4 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
MOBISYS
2006
ACM
16 years 4 months ago
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs
Deployments of wireless LANs consisting of hundreds of 802.11 access points with a large number of users have been reported in enterprises as well as college campuses. However, du...
Anmol Sheth, Christian Doerr, Dirk Grunwald, Richa...
117
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Joint MMSE Transceiver Design for Closed-Loop Non-Regenerative MIMO Relaying Systems
— In this paper, as a extended structure of the existing relay-destination joint minimum mean square error (MMSE) design, we propose a new source-relay-destination joint MMSE des...
Chang-Ick Song, Kyoung-Jae Lee, Inkyu Lee
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 11 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
126
Voted
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 11 months ago
A Framework for Optimizing the Uplink Performance of Distributed Antenna Systems under a Constrained Backhaul
Abstract— It has recently been shown that multi-cell cooperations in cellular networks, enabling distributed antenna systems and joint transmission or joint detection across cell...
Patrick Marsch, Gerhard Fettweis