Sciweavers

3471 search results - page 579 / 695
» User activity histories
Sort
View
GLOBECOM
2009
IEEE
15 years 4 months ago
On the Performance of Compressed Interference Forwarding for Uplink Base Station Cooperation
Abstract—The capacity of today’s cellular mobile communications systems is mainly limited by inter-cell interference. Multi-cell joint transmission or joint detection schemes a...
Michael Grieger, Patrick Marsch, Gerhard Fettweis,...
NDSS
2009
IEEE
15 years 4 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
ICSM
2009
IEEE
15 years 4 months ago
Managing code clones using dynamic change tracking and resolution
Code cloning is widely recognized as a threat to the maintainability of source code. As such, many clone detection and removal strategies have been proposed. However, some clones ...
Michiel de Wit, Andy Zaidman, Arie van Deursen
ICSM
2009
IEEE
15 years 4 months ago
On the use of relevance feedback in IR-based concept location
Concept location is a critical activity during software evolution as it produces the location where a change is to start in response to a modification request, such as, a bug repo...
Gregory Gay, Sonia Haiduc, Andrian Marcus, Tim Men...
INFOCOM
2009
IEEE
15 years 4 months ago
Experimental Comparison of Bandwidth Estimation Tools for Wireless Mesh Networks
—Measurement of available bandwidth in a network has always been a topic of great interest. This knowledge can be applied to a wide variety of applications and can be instrumenta...
Dhruv Gupta, Di Wu, Prasant Mohapatra, Chen-Nee Ch...