Sciweavers

1532 search results - page 39 / 307
» An analysis of additivity in OLAP systems
Sort
View
JCM
2007
134views more  JCM 2007»
13 years 7 months ago
Performance Analysis of Zero-IF MIMO OFDM Transceivers with IQ Imbalance
Abstract— This contribution analytically studies the influence of IQ mismatch on the performance of multiple-antenna orthogonal frequency division multiplexing (OFDM) systems ba...
Tim C. W. Schenk, Erik R. Fledderus, Peter F. M. S...
CACM
2006
192views more  CACM 2006»
13 years 7 months ago
Live forensics: diagnosing your system without killing it first
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Frank Adelstein
CAV
2008
Springer
108views Hardware» more  CAV 2008»
13 years 9 months ago
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
Akash Lal, Thomas W. Reps
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 2 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
WSC
1998
13 years 9 months ago
So You Have Your Model: What to Do Next. A Tutorial on Simulation Output Analysis
Simulation models are built with the intent of studying the behavior of the real system represented by the model. However, a simulation model generates random outputs; thus, the d...
Martha A. Centeno, M. Florencia Reyes