Sciweavers

1453 search results - page 231 / 291
» State and history in operating systems
Sort
View
103
Voted
VTC
2010
IEEE
129views Communications» more  VTC 2010»
14 years 11 months ago
A Systematic LT Coded Arrangement for Transmission over Correlated Shadow Fading Channels in 802.11 Ad-Hoc Wireless Networks
— Systematic Luby Transform (SLT) codes constitute rateless codes, which are capable of adaptively adjusting their code rate depending on the channel quality without any explicit...
Hoang Anh Ngo, Tim Stevens, Robert G. Maunder, Laj...
RAID
2010
Springer
14 years 10 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
102
Voted
SIGSOFT
2010
ACM
14 years 10 months ago
Software engineering and wireless sensor networks: happy marriage or consensual divorce?
The development of wireless sensor networks (WSNs) software today is tackled by a code-and-fix process that relies solely on the primitive constructs provided by the operating sys...
Gian Pietro Picco
134
Voted
ICDAR
2009
IEEE
14 years 10 months ago
A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs
In this paper, an approach based on the combination of discrete Hidden Markov Models (HMMs) in the ROC space is proposed to improve the performance of off-line signature verificat...
Luana Batista, Eric Granger, Robert Sabourin
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
14 years 7 months ago
Semi-autonomous networks: Network resilience and adaptive trees
This paper examines the dynamics of a networked multi-agent system operating with a consensus-type coordination algorithm that can be influenced by external agents. We refer to thi...
Airlie Chapman, Mehran Mesbahi