Sciweavers

438 search results - page 49 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
ICSE
2010
IEEE-ACM
14 years 12 days ago
Using dynamic execution traces and program invariants to enhance behavioral model inference
Software behavioral models have proven useful for design, validation, verification, and maintenance. However, existing approaches for deriving such models sometimes overgeneraliz...
Ivo Krka, Yuriy Brun, Daniel Popescu, Joshua Garci...
WSC
2000
13 years 9 months ago
Applications of business process simulation and lean techniques in British Telecommunications PLC
Business processes are increasingly key to the success of companies in the service industry. It is important that these processes are designed and maintained to deliver the most c...
Simon Dennis, Ben C. King, Martin Hind, Stewart Ro...
NETWORKING
2011
12 years 10 months ago
The Problem of Sensing Unused Cellular Spectrum
Abstract. Sensing mechanisms that estimate the occupancy of wireless spectrum are crucial to the success of approaches based on Dynamic Spectrum Access. In this paper, we present k...
Daniel Willkomm, Sridhar Machiraju, Jean Bolot, Ad...
VTC
2010
IEEE
145views Communications» more  VTC 2010»
13 years 6 months ago
Performance of Multihop Wireless Links over Generalized-K Fading Channels
— The performance of multihop links is studied in this contribution by both analysis and simulations, when communicating over Generalized-K (KG) fading channels. The performance ...
Jianfei Cao, Lie-Liang Yang, Zhangdui Zhong
DEBS
2003
ACM
14 years 26 days ago
Relational subscription middleware for Internet-scale publish-subscribe
We present a design of a distributed publish-subscribe system that extends the functionality of messaging middleware with “relational subscriptions”, to support timely updates...
Yuhui Jin, Robert E. Strom