Sciweavers

642 search results - page 34 / 129
» corr 2006
Sort
View
CORR
2006
Springer
110views Education» more  CORR 2006»
15 years 14 days ago
The topology of covert conflict
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry bod...
Shishir Nagarja
102
Voted
CORR
2006
Springer
137views Education» more  CORR 2006»
15 years 14 days ago
Achievable Rates for the Multiple Access Channel with Feedback and Correlated Sources
In this paper, we investigate achievable rates on the multiple access channel with feedback and correlated sources (MACFCS). The motivation for studying the MACFCS stems from the ...
Lawrence Ong, Mehul Motani
85
Voted
CORR
2006
Springer
132views Education» more  CORR 2006»
15 years 14 days ago
Streaming Maximum-Minimum Filter Using No More than Three Comparisons per Element
The running maximum-minimum (MAX-MIN) filter computes the maxima and minima over running windows of size w. This filter has numerous applications in signal processing and time seri...
Daniel Lemire
CORR
2006
Springer
172views Education» more  CORR 2006»
15 years 14 days ago
Approximate Convex Optimization by Online Game Playing
This paper describes a general framework for converting online game playing algorithms into constrained convex optimization algorithms. This framework allows us to convert the wel...
Elad Hazan
92
Voted
CORR
2006
Springer
152views Education» more  CORR 2006»
15 years 14 days ago
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
Damiano Bolzoni, Sandro Etalle