Sciweavers

189 search results - page 23 / 38
» Performance Evaluation of QAM-Based BICM: An Analytical Appr...
Sort
View
111
Voted
CP
2007
Springer
15 years 3 months ago
On Universal Restart Strategies for Backtracking Search
Abstract. Constraint satisfaction and propositional satisfiability problems are often solved using backtracking search. Previous studies have shown that a technique called randomi...
Huayue Wu, Peter van Beek
MOBICOM
2004
ACM
15 years 2 months ago
Vehicle-to-vehicle safety messaging in DSRC
— This paper studies the design of layer-2 protocols for a vehicle to send safety messages to other vehicles. The target is to send vehicle safety messages with high reliability ...
Qing Xu 0007, Tony K. Mak, Jeff Ko, Raja Sengupta
ISSTA
2012
ACM
12 years 12 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
PERCOM
2010
ACM
14 years 11 months ago
Engineering energy-efficient target detection applications in Wireless Sensor Networks
This paper addresses the problem of engineering energy-efficient target detection applications using unattended Wireless Sensor Networks (WSNs) for long-lasting surveillance of are...
Paolo Medagliani, Jeremie Leguay, Vincent Gay, Mar...
FTCS
1997
100views more  FTCS 1997»
14 years 10 months ago
Discriminating Fault Rate and Persistency to Improve Fault Treatment
In this paper the consolidate identification of faults, distinguished as transient or permanent/intermittent, is approached. Transient faults discrimination has long been performe...
Andrea Bondavalli, Silvano Chiaradonna, Felicita D...