Sciweavers

2720 search results - page 27 / 544
» How do we count
Sort
View
IJSNET
2006
133views more  IJSNET 2006»
13 years 9 months ago
On the hop count statistics for randomly deployed wireless sensor networks
: In this paper we focus on exploiting the information provided by a generally accepted and largely ignored hypothesis (the random deployment of the nodes of an ad hoc or wireless ...
Stefan Dulman, Michele Rossi, Paul J. M. Havinga, ...
DAC
2005
ACM
14 years 10 months ago
Net weighting to reduce repeater counts during placement
We demonstrate how to use placement to ameliorate the predicted repeater explosion problem caused by poor interconnect scaling. We achieve repeater count reduction by dynamically ...
Brent Goplen, Prashant Saxena, Sachin S. Sapatneka...
GLOBECOM
2006
IEEE
14 years 3 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
ICC
2009
IEEE
122views Communications» more  ICC 2009»
14 years 4 months ago
Sensitive Data Requests: Do Sites Ask Correctly?
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Craig A. Shue, Minaxi Gupta
SEFM
2005
IEEE
14 years 3 months ago
Counting Interface Automata and their Application in Static Analysis of Actor Models
We present an interface theory based approach to static analysis of actor models. We first introduce a new interface theory, which is based on Interface Automata, and which is ca...
Ernesto Wandeler, Jörn W. Janneck, Edward A. ...