Sciweavers

42 search results - page 4 / 9
» Windows of Vulnerability: A Case Study Analysis
Sort
View
ICDE
2012
IEEE
291views Database» more  ICDE 2012»
13 years 11 months ago
Efficiently Monitoring Top-k Pairs over Sliding Windows
Top-k pairs queries have received significant attention by the research community. k-closest pairs queries, k-furthest pairs queries and their variants are among the most well stu...
Zhitao Shen, Muhammad Aamir Cheema, Xuemin Lin, We...
SPEECH
2011
14 years 6 months ago
The importance of phase in speech enhancement
Typical speech enhancement methods, based on the short-time Fourier analysis-modification-synthesis (AMS) framework, modify only the magnitude spectrum and keep the phase spectru...
Kuldip K. Paliwal, Kamil K. Wójcicki, Benja...
GLOBECOM
2009
IEEE
15 years 3 months ago
Analysis of Asynchronous Multi-Packet Reception in 802.11 Distributed Wireless Networks
— This paper proposes a mathematical framework for evaluating the throughput of an 802.11 Distributed Wireless Network (DWN) when the system allows Multi-Packet Reception (MPR) i...
Fulvio Babich, Massimiliano Comisso
DAGSTUHL
2004
15 years 1 months ago
The Priority R-Tree: A Practically Efficient and Worst-Case-Optimal R-Tree
We present the Priority R-tree, or PR-tree, which is the first R-tree variant that always answers a window query using O((N/B)1-1/d + T/B) I/Os, where N is the number of ddimensio...
Lars Arge, Mark de Berg, Herman J. Haverkort, Ke Y...
DIMVA
2007
15 years 1 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...