Sciweavers

15073 search results - page 2707 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
WWW
2009
ACM
15 years 11 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
GLVLSI
2009
IEEE
186views VLSI» more  GLVLSI 2009»
15 years 11 months ago
Bitmask-based control word compression for NISC architectures
Implementing a custom hardware is not always feasible due to cost and time considerations. No instruction set computer (NISC) architecture is one of the promising direction to des...
Chetan Murthy, Prabhat Mishra
ICASSP
2009
IEEE
15 years 11 months ago
Subspace tracking of fast time-varying channels in precoded MIMO-OFDM systems
This paper presents a blind subspace-based tracking scheme for precoded MIMO-OFDM systems over rapidly time-varying wireless channels. Subspace-based tracking is normally consider...
Chao-Cheng Tu, Benoît Champagne
ICNP
2009
IEEE
15 years 10 months ago
Principles of Safe Policy Routing Dynamics
—We introduce the Dynamic Policy Routing (DPR) model that captures the propagation of route updates under arbitrary changes in topology or path preferences. DPR introduces the no...
Sam Epstein, Karim Mattar, Ibrahim Matta
ICNP
2009
IEEE
15 years 10 months ago
oCast: Optimal Multicast Routing Protocol for Wireless Sensor Networks
—In this paper, we describe oCast, an energy-optimal multicast routing protocol for wireless sensor networks. The general minimum-energy multicast problem is NP-hard. Intermitten...
Lu Su, Bolin Ding, Yong Yang, Tarek F. Abdelzaher,...
« Prev « First page 2707 / 3015 Last » Next »