Sciweavers

634 search results - page 58 / 127
» Groundwork for Weak Analysis
Sort
View
136
Voted
MSWIM
2005
ACM
15 years 9 months ago
Performance analysis of the intertwined effects between network layers for 802.11g transmissions
While the canonical behavior of today’s home Internet users involves several residents concurrently executing diverse Internet applications, the most common home configuration ...
Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant...
117
Voted
CEAS
2005
Springer
15 years 9 months ago
Combating Spam through Legislation: A Comparative Analysis of US and European Approaches
Unsolicited Commercial Communication also known as spam - has traditionally been the most visible e-mail threat and has reached a point where it creates a major problem for the de...
Evangelos Moustakas, C. Ranganathan, Penny Duqueno...
151
Voted
IPPS
1998
IEEE
15 years 8 months ago
Performance Analysis of a Fault-Tolerant Scheme for Location Management of Mobile Hosts
We consider the problem of location management of mobile users. The objective is to keep track of the mobile users in order to deliver calls. The IS-41 is a simple strategy for loc...
Saad Biaz, Nitin H. Vaidya
134
Voted
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
15 years 7 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
159
Voted
JCNS
2000
165views more  JCNS 2000»
15 years 3 months ago
A Population Density Approach That Facilitates Large-Scale Modeling of Neural Networks: Analysis and an Application to Orientati
We explore a computationally efficient method of simulating realistic networks of neurons introduced by Knight, Manin, and Sirovich (1996) in which integrate-and-fire neurons are ...
Duane Q. Nykamp, Daniel Tranchina