Sciweavers

7796 search results - page 1335 / 1560
» On Generalized Schur Numbers
Sort
View
INFOCOM
2008
IEEE
15 years 5 months ago
Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks
—Channel assignment is a very important topic in wireless networks. In this paper, we study FDMA channel assignment in a non-cooperative wireless network, where devices are sel...
Fan Wu, Sheng Zhong, Chunming Qiao
IPPS
2008
IEEE
15 years 5 months ago
Software monitoring with bounded overhead
In this paper, we introduce the new technique of HighConfidence Software Monitoring (HCSM), which allows one to perform software monitoring with bounded overhead and concomitantl...
Sean Callanan, David J. Dean, Michael Gorbovitski,...
155
Voted
LCN
2008
IEEE
15 years 5 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
81
Voted
NDSS
2008
IEEE
15 years 5 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
85
Voted
QEST
2008
IEEE
15 years 5 months ago
Quasi-Birth-Death Processes, Tree-Like QBDs, Probabilistic 1-Counter Automata, and Pushdown Systems
We begin by observing that (discrete-time) QuasiBirth-Death Processes (QBDs) are equivalent, in a precise sense, to (discrete-time) probabilistic 1-Counter Automata (p1CAs), and b...
Kousha Etessami, Dominik Wojtczak, Mihalis Yannaka...
« Prev « First page 1335 / 1560 Last » Next »