Sciweavers

694 search results - page 82 / 139
» Overcoming Challenges of Maturity
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 6 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
SSDBM
2008
IEEE
111views Database» more  SSDBM 2008»
15 years 6 months ago
iJoin: Importance-Aware Join Approximation over Data Streams
We consider approximate join processing over data streams when memory limitations cause incoming tuples to overflow the available space, precluding exact processing. Selective evi...
Dhananjay Kulkarni, Chinya V. Ravishankar
AIPR
2007
IEEE
15 years 6 months ago
Moving Vehicle Registration and Super-Resolution
We describe a method for registering and superresolving moving vehicles from aerial surveillance video. The challenge of vehicle super-resolution lies in the fact that vehicles ma...
Frederick W. Wheeler, Anthony J. Hoogs
GLOBECOM
2007
IEEE
15 years 6 months ago
Directional MAC for 60 GHz Using Polarization Diversity Extension (DMAC-PDX)
— This paper proposes a directional medium access control (DMAC) algorithm for wireless communication networks operating in the 60 GHz bands. Wireless communications using the 60...
Ferhat Yildirim, Huaping Liu
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 6 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen