Sciweavers

107 search results - page 10 / 22
» Approximating Fair Use in LicenseScript
Sort
View
LISA
2000
13 years 8 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
CAGD
2008
109views more  CAGD 2008»
13 years 7 months ago
Application of B-spline techniques to the modeling of airplane wings and numerical grid generation
In the present paper we give account of an effort that aimed at the unification of the whole geometric preprocessing that preceded the wind tunnel readings with a realistic airpla...
Karl-Heinz Brakhage, Philipp Lamby
CSDA
2011
13 years 2 months ago
Inferences on Weibull parameters with conventional type-I censoring
In this article we consider the statistical inferences of the unknown parameters of a Weibull distribution when the data are Type-I censored. It is well known that the maximum lik...
Avijit Joarder, Hare Krishna, Debasis Kundu
ICC
2009
IEEE
135views Communications» more  ICC 2009»
13 years 5 months ago
Load Aware Broadcast in Mobile Ad Hoc Networks
In a wireless ad hoc network, the main issue of a good broadcast protocol is to attain maximum reachability with minimal packet forwarding. Existing protocols address this issue by...
Md. Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, ...
TC
2002
13 years 7 months ago
General Modeling and Performance Analysis for Location Management in Wireless Mobile Networks
Location management plays a significant role in current and future wireless mobile networks in effectively delivering services to the mobile users on the move. Many schemes have be...
Yuguang Fang