Sciweavers

811 search results - page 69 / 163
» Flow Theory: An Enhancement
Sort
View
IJUFKS
2006
64views more  IJUFKS 2006»
13 years 8 months ago
Cautious Analysis of Project Risks by Interval-Valued Initial Data
One of the most common performance measures in selection and management of projects is the Net Present Value (NPV). In the paper, we study a case when initial data about the NPV p...
Lev V. Utkin
ASPDAC
2010
ACM
141views Hardware» more  ASPDAC 2010»
13 years 6 months ago
An extension of the generalized Hamiltonian method to S-parameter descriptor systems
Abstract-- A generalized Hamiltonian method (GHM) was recently proposed for the passivity test of hybrid descriptor systems [1]. This paper extends the GHM theory to its S-paramete...
Zheng Zhang, Ngai Wong
CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 3 months ago
Bulk File Download Throughput in a Single Station WLAN with Nonzero Propagation Delay
We analyze TCP-controlled bulk file transfers in a single station WLAN with nonzero propagation delay between the file server and the WLAN. Our approach is to model the flow of pac...
B. K. Pradeepa, Joy Kuri
ICFP
2005
ACM
14 years 8 months ago
Witnessing side-effects
We present a new approach to the old problem of adding side effects to purely functional languages. Our idea is to extend the language with "witnesses," which is based o...
Tachio Terauchi, Alexander Aiken
SEC
2008
13 years 10 months ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero