Sciweavers

7904 search results - page 1496 / 1581
» Sequence Query Processing
Sort
View
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 9 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
95
Voted
ICC
2009
IEEE
106views Communications» more  ICC 2009»
15 years 9 months ago
Pilot Matrix Design for Interim Channel Estimation in Two-Hop MIMO AF Relay Systems
In this paper, we are concerned with a two-hop multi-input-multi-output (MIMO) amplify-andforward (AF) relay system consisting of a source node (SN), a relay node (RN), and a dest...
Jun Ma, Philip V. Orlik, Jinyun Zhang, Ye (Geoffre...
138
Voted
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 9 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
134
Voted
ICST
2009
IEEE
15 years 9 months ago
Optimizing Probabilities of Real-Time Test Case Execution
—Model-based test derivation for real-time system has been proven to be a hard problem for exhaustive test suites. Therefore, techniques for real-time testing do not aim to exhau...
Nicolás Wolovick, Pedro R. D'Argenio, Hongy...
WABI
2009
Springer
117views Bioinformatics» more  WABI 2009»
15 years 9 months ago
A Simulation Study Comparing Supertree and Combined Analysis Methods Using SMIDGen
Background: Supertree methods comprise one approach to reconstructing large molecular phylogenies given multi-marker datasets: trees are estimated on each marker and then combined...
M. Shel Swenson, François Barbançon,...
« Prev « First page 1496 / 1581 Last » Next »