Sciweavers

2135 search results - page 62 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
JSW
2007
106views more  JSW 2007»
13 years 8 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain
IPPS
2007
IEEE
14 years 2 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
PDPTA
2000
13 years 9 months ago
On the application of accelerating simulation methods in network analysis
When evaluating quantitative aspects of communication networks using simulation, one of the main difficulties to face is the often considerable computing power required. In some s...
José Incera, Gerardo Rubino, Nicolás...
ICASSP
2010
IEEE
13 years 6 months ago
Independent subspace analysis with prior information for fMRI data
Independent component analysis (ICA) has been successfully applied for the analysis of functional magnetic resonance imaging (fMRI) data. However, independence might be too strong...
Sai Ma, Xi-Lin Li, Nicolle M. Correa, Tülay A...
NETWORKING
2004
13 years 9 months ago
Pricing Differentiated Services: A Game-Theoretic Approach
The goal of this paper is to study pricing of differentiated services and its impact on the choice of service priority at equilibrium. We consider both TCP connections as well as n...
Eitan Altman, Dhiman Barman, Rachid El Azouzi, Dav...