Sciweavers

366 search results - page 44 / 74
» A Survey of Models and Design Methods for Self-organizing Ne...
Sort
View
MSWIM
2005
ACM
14 years 2 months ago
Analysis of performance issues in an IP-based UMTS radio access network
The substitution of ATM transport by IP in future UMTS Radio Access Networks (UTRAN) introduces several performance challenges that need to be addressed to guarantee the feasibili...
Xavier Pérez Costa, Kjell Heinze, Albert Ba...
ALMOB
2006
113views more  ALMOB 2006»
13 years 8 months ago
Inverse bifurcation analysis: application to simple gene systems
Background: Bifurcation analysis has proven to be a powerful method for understanding the qualitative behavior of gene regulatory networks. In addition to the more traditional for...
James Lu, Heinz W. Engl, Peter Schuster
WSCG
2004
151views more  WSCG 2004»
13 years 10 months ago
Inserting G1 Discontinuities into Free-form Features for Aesthetic Design
Free form shapes are often used to fulfil both aesthetic and design constraints applied to parametric models currently adopted in CAD environments. Up to now, designers and engine...
Vincent Cheutet, Jean-Philippe Pernot, Jean-Claude...
INFOCOM
2010
IEEE
13 years 7 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna