Sciweavers

1201 search results - page 99 / 241
» Exact Analysis of Exact Change
Sort
View
CMS
2006
127views Communications» more  CMS 2006»
13 years 10 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 9 months ago
Performance Analysis of CDMA Signature Optimization with Finite Rate Feedback
We analyze the performance of CDMA signature optimization with finite rate feedback. For a particular user, the receiver selects a signature vector from a signature codebook to avo...
Wei Dai, Youjian Liu, Brian Rider
IOR
2008
103views more  IOR 2008»
13 years 9 months ago
Portfolio Credit Risk with Extremal Dependence: Asymptotic Analysis and Efficient Simulation
We consider the risk of a portfolio comprised of loans, bonds, and financial instruments that are subject to possible default. In particular, we are interested in performance meas...
Achal Bassamboo, Sandeep Juneja, Assaf J. Zeevi
PE
2002
Springer
137views Optimization» more  PE 2002»
13 years 8 months ago
Analysis of two competing TCP/IP connections
Many mathematical models exist for describing the behavior of TCP/IP (TCP: transmission control protocol) under an exogenous loss process that does not depend on the window size. ...
Eitan Altman, Tania Jiménez, R. Nú&n...
IEICET
2010
80views more  IEICET 2010»
13 years 7 months ago
Theoretical Analysis of Density Ratio Estimation
Density ratio estimation has gathered a great deal of attention recently since it can be used for various data processing tasks. In this paper, we consider three methods of densit...
Takafumi Kanamori, Taiji Suzuki, Masashi Sugiyama