Sciweavers

5234 search results - page 743 / 1047
» Simulation of Computer Network Attacks
Sort
View
IWCMC
2010
ACM
15 years 6 months ago
Packet level scheduling schemes for multi-user MIMO systems with beamforming
We investigate the packet-level scheduling for the downlink of multiple-input multiple-output (MIMO) multi-user systems using beamforming. We consider the traffic arrival process ...
Masoomeh Torabzadeh, Wessam Ajib
NSDI
2004
15 years 6 months ago
Contract-Based Load Management in Federated Distributed Systems
This paper focuses on load management in looselycoupled federated distributed systems. We present a distributed mechanism for moving load between autonomous participants using bil...
Magdalena Balazinska, Hari Balakrishnan, Michael S...
SDM
2004
SIAM
229views Data Mining» more  SDM 2004»
15 years 6 months ago
R-MAT: A Recursive Model for Graph Mining
How does a `normal' computer (or social) network look like? How can we spot `abnormal' sub-networks in the Internet, or web graph? The answer to such questions is vital ...
Deepayan Chakrabarti, Yiping Zhan, Christos Falout...
NCA
2008
IEEE
15 years 4 months ago
Improved transmission of vector quantized data over noisy channels
The conventional channel-optimized vector quantization (COVQ) is very powerful in the protection of vector quantization (VQ) data over noisy channels. However, it suffers from the ...
Chi-Sing Leung, John Sum, Herbert Chan
RAID
2010
Springer
15 years 3 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...