Sciweavers

438 search results - page 17 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
AUTOMATICA
2006
104views more  AUTOMATICA 2006»
13 years 7 months ago
Identification of multi-input systems: variance analysis and input design issues
This paper examines the identification of multi-input systems. Motivated by an experiment design problem (should one excite the various inputs simultaneously or separately), we ex...
Michel Gevers, Ljubisa Miskovic, Dominique Bonvin,...
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 23 days ago
Designed for Success - Empirical Evidence on Features of Corporate Web Pages
We investigate how eight concepts derived from the media characteristics of the WWW impact corporate success in E-Business if implemented as features of companies’ web sites. We...
Nils Madeja, Detlef Schoder
WORDS
2005
IEEE
14 years 1 months ago
Towards a Flow Analysis for Embedded System C Programs
Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
Jan Gustafsson, Andreas Ermedahl, Björn Lispe...
TWC
2011
367views more  TWC 2011»
13 years 2 months ago
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
—In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of pac...
Mariam Kaynia, Nihar Jindal, Geir E. Øien
SIAMSC
2008
167views more  SIAMSC 2008»
13 years 7 months ago
High Order Numerical Quadratures to One Dimensional Delta Function Integrals
Abstract. We study high order numerical quadratures to one dimensional delta function integrals in this paper. This is motivated by the fact that traditional numerical quadratures ...
Xin Wen