Sciweavers

950 search results - page 46 / 190
» Constraint Based Resilience Analysis
Sort
View
NECO
2008
122views more  NECO 2008»
13 years 10 months ago
Constrained Subspace ICA Based on Mutual Information Optimization Directly
We introduce a new approach to constrained Independent Component Analysis (ICA) by formulating the original, unconstrained ICA problem as well as the constraints in mutual informa...
Marc M. Van Hulle
ASYNC
2002
IEEE
120views Hardware» more  ASYNC 2002»
14 years 3 months ago
Relative Timing Based Verification of Timed Circuits and Systems
Advanced clock-delayed1 and self-resetting domino circuits are becoming increasingly important design styles in aggressive synchronous as well as asynchronous design. Their design...
Peter A. Beerel, Ken S. Stevens, Hoshik Kim
CONCUR
2009
Springer
14 years 4 months ago
Query-Based Model Checking of Ad Hoc Network Protocols
Abstract. A prominent source of complexity in the verification of ad hoc network (AHN) protocols is the fact that the number of network topologies grows exponentially with the squ...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka
ICNP
2007
IEEE
14 years 4 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu
IWSOS
2007
Springer
14 years 4 months ago
Mercator: Self-organizing Geographic Connectivity Maps for Scalable Ad-Hoc Routing
Abstract. A fundamental problem of future networks is to get fully selforganized routing protocols with good scalability properties that produce good paths in a wide range of netwo...
Luis A. Hernando, Unai Arronategui