Sciweavers

107 search results - page 16 / 22
» Performance comparison of device-to-device mode selection sc...
Sort
View
IJISEC
2006
106views more  IJISEC 2006»
14 years 10 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
CORR
2010
Springer
100views Education» more  CORR 2010»
14 years 10 months ago
The Projected GSURE for Automatic Parameter Tuning in Iterative Shrinkage Methods
Linear inverse problems are very common in signal and image processing. Many algorithms that aim at solving such problems include unknown parameters that need tuning. In this work...
Raja Giryes, Michael Elad, Yonina C. Eldar
WCNC
2010
IEEE
15 years 1 months ago
Joint Optimization of Power Allocation and Relay Deployment in Wireless Sensor Networks
—We study the problem of optimizing the symbol error probability (SEP) performance of cluster-based cooperative wireless sensor networks (WSNs). It is shown in the literature tha...
Mohammad Abdizadeh, Hadi Jamali Rad, Bahman Abolha...
DATE
2004
IEEE
145views Hardware» more  DATE 2004»
15 years 1 months ago
Hierarchical Adaptive Dynamic Power Management
Dynamic power management aims at extending battery life by switching devices to lower-power modes when there is a reduced demand for service. Static power management strategies can...
Zhiyuan Ren, Bruce H. Krogh, Radu Marculescu
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
15 years 10 months ago
Fast range-summable random variables for efficient aggregate estimation
Exact computation for aggregate queries usually requires large amounts of memory ? constrained in data-streaming ? or communication ? constrained in distributed computation ? and ...
Florin Rusu, Alin Dobra