Sciweavers

777 search results - page 50 / 156
» presence 2010
Sort
View
75
Voted
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 19 days ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
98
Voted
CORR
2010
Springer
117views Education» more  CORR 2010»
15 years 19 days ago
Relay Assisted Cooperative OSTBC Communication with SNR Imbalance and Channel Estimation Errors
In this paper, a two-hop relay assisted cooperative Orthogonal Space-Time Block Codes (OSTBC) transmission scheme is considered for the downlink communication of a cellular system,...
Bo Niu, Mihaela C. Beluri, Zinan Lin, Prabhakar Ch...
157
Voted
CORR
2010
Springer
211views Education» more  CORR 2010»
15 years 19 days ago
Studying the Feasibility and Importance of Software Testing: An Analysis
Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of tes...
S. S. Riaz Ahamed
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 19 days ago
Continuum Percolation in the Intrinsically Secure Communications Graph
The intrinsically secure communications graph (-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence...
Pedro C. Pinto, Moe Z. Win
89
Voted
CORR
2010
Springer
100views Education» more  CORR 2010»
15 years 19 days ago
General Model for Single and Multiple Channels WLANs with Quality of Service Support
In this paper we develop an intergraded model for request mechanism and data transmission in the uplink phase in the presence of channel noise. This model supports quality of serv...
Abdelsalam B. Amer, Fayez Gebali