Sciweavers

2572 search results - page 421 / 515
» codes 2008
Sort
View
EUROSYS
2008
ACM
16 years 1 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
CISS
2008
IEEE
15 years 10 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
GLOBECOM
2008
IEEE
15 years 10 months ago
Optimal LLR Clipping Levels for Mixed Hard/Soft Output Detection
Abstract—Consider a communications system where the detector generates a mix of hard and soft outputs, which are then fed into a soft-input channel decoder. In such a setting, it...
Ernesto Zimmermann, David L. Milliner, John R. Bar...
ICC
2008
IEEE
120views Communications» more  ICC 2008»
15 years 10 months ago
Near-Optimum Soft-Output Ant-Colony-Optimization Based Multiuser Detection for the DS-CDMA Uplink
— In this contribution, a novel soft-output Ant Colony Optimization (ACO) based Multi-User Detector (MUD) is proposed for the synchronous Direct-Sequence Code-DivisionMultiple-Ac...
Chong Xu, Lie-Liang Yang, Robert G. Maunder, Lajos...
ICC
2008
IEEE
116views Communications» more  ICC 2008»
15 years 10 months ago
Intelligent Weather Aware Scheme for Satellite Systems
— Rain, snow, gaseous, cloud, fog, scintillation and other atmospheric properties can have a distorting effect on signal fidelity of Ku and Ka bands, thus resulting in excessive ...
Kamal Harb, Changcheng Huang, Anand Srinivasan, Br...