Sciweavers

5234 search results - page 736 / 1047
» Simulation of Computer Network Attacks
Sort
View
IPPS
2009
IEEE
15 years 11 months ago
Resource allocation strategies for constructive in-network stream processing
We consider the operator mapping problem for in-network stream processing, i.e., the application of a tree of operators in steady-state to multiple data objects that are continuou...
Anne Benoit, Henri Casanova, Veronika Rehn-Sonigo,...
ICNSC
2008
IEEE
15 years 11 months ago
Robust Variance Constrained Filter Design for Systems with Non-Gaussian Noises
In this paper, a variance constrained filtering problem is considered for systems with both non-Gaussian noises and polytopic uncertainty. A novel filter is developed to estimate t...
Fuwen Yang, Yongmin Li, Xiaohui Liu
116
Voted
WCNC
2008
IEEE
15 years 11 months ago
Sidelobe Suppression for OFDM-Based Cognitive Radios Using Constellation Expansion
— In this paper, we present a novel algorithm for reducing sidelobe interference power levels in OFDM-based cognitive radios. Existing techniques for sidelobe suppression can be ...
Srikanth Pagadarai, Rakesh Rajbanshi, Alexander M....
AIMS
2008
Springer
15 years 11 months ago
Dynamic Consistency Analysis for Convergent Operators
It has been shown that sets of convergent operators with a shared fixed point can simulate autonomic control mechanisms, but many questions remain about this management technique....
Alva L. Couch, Marc Chiarini
ICDCSW
2007
IEEE
15 years 11 months ago
Enhancing Neighborship Consistency for Peer-to-Peer Distributed Virtual Environments
Although P2P-based DVEs can potentially solve the scalability issues, other important issues such as consistency remain unexplored. In this paper, we address neighborship consiste...
Jehn-Ruey Jiang, Jiun-Shiang Chiou, Shun-Yun Hu