Sciweavers

9588 search results - page 1558 / 1918
» Service Value Networks
Sort
View
HICSS
2008
IEEE
139views Biometrics» more  HICSS 2008»
15 years 11 months ago
Understanding the Roles of Knowledge Sharing and Trust in Online Learning Communities
This paper builds upon action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing...
Brian Thoms, Nathan Garrett, Jesus Canelon Herrera...
127
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
Detecting Anomalies Using End-to-End Path Measurements
—In this paper, we propose new “low-overhead” network monitoring techniques to detect violations of path-level QoS guarantees like end-to-end delay, loss, etc. Unlike existin...
K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi
NDSS
2008
IEEE
15 years 11 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
PIMRC
2008
IEEE
15 years 11 months ago
An SMR based advance resource reservation scheme for combined mobility and QoS Provisioning
—One of the major problems of deploying RSVP in the mobile environment is called the advance resource reservation problem. If an RSVP reservation path is reserved in advance in t...
Hao Wang, David I. Laurenson, Jane Hillston
WCNC
2008
IEEE
15 years 11 months ago
Iterative Detection of Three-Stage Concatenated FFH-MFSK
Abstract— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying ...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, L...
« Prev « First page 1558 / 1918 Last » Next »