Sciweavers

1026 search results - page 117 / 206
» The least-mean-magnitude-phase algorithm with applications t...
Sort
View
CORR
2010
Springer
131views Education» more  CORR 2010»
14 years 10 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
MOBIHOC
2008
ACM
15 years 9 months ago
Bubble rap: social-based forwarding in delay tolerant networks
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket S...
Pan Hui, Jon Crowcroft, Eiko Yoneki
IWSOS
2007
Springer
15 years 4 months ago
The Development of a Wireless Sensor Network Sensing Node Utilising Adaptive Self-diagnostics
— In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequ...
Hai Li, Mark C. Price, Jonathan Stott, Ian W. Mars...
CORR
2011
Springer
151views Education» more  CORR 2011»
14 years 4 months ago
Sparsity Enhanced Decision Feedback Equalization
For single-carrier systems with frequency domain equalization, decision feedback equalization (DFE) performs better than linear equalization and has much lower computational compl...
Jovana Ilic, Thomas Strohmer
ICDCN
2009
Springer
15 years 4 months ago
Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks
The research community has witnessed a large interest in monitoring large scale distributed systems. In these applications typically we wish to monitor a global system condition wh...
Ali Abbasi, Ahmad Khonsari, Mohammad Sadegh Talebi