Sciweavers

889 search results - page 103 / 178
» General Conclusions
Sort
View
IMC
2009
ACM
15 years 10 months ago
Internet optometry: assessing the broken glasses in internet reachability
Reachability is thought of as the most basic service provided by today’s Internet. Unfortunately, this does not imply that the community has a deep understanding of it. Research...
Randy Bush, Olaf Maennel, Matthew Roughan, Steve U...
ICASSP
2008
IEEE
15 years 10 months ago
Transmit codes and receive filters for pulse compression radar systems
Pulse compression radar systems make use of transmit code sequences and receive filters that are specially designed to achieve good range resolution and target detection capabili...
Petre Stoica, Jian Li, Ming Xue
AINA
2007
IEEE
15 years 10 months ago
How to Study Wireless Mesh Networks: A hybrid Testbed Approach
— Simulation is the most famous way to study wireless an mobile networks since they offer a convenient combination of flexibility and controllability. However, their largest dis...
Alexander Zimmermann, Mesut Günes, Martin Wen...
ICSM
2007
IEEE
15 years 10 months ago
Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach
Recent software systems usually feature an automated failure reporting component, with which a huge number of failures are collected from software end-users. With a proper support...
Xiangyu Zhang Chao Liu, Yu Zhang, Jiawei Han, Bhar...
CCS
2007
ACM
15 years 10 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...