Sciweavers

1270 search results - page 231 / 254
» IF Validation Environment Tutorial
Sort
View
ACSC
2006
IEEE
14 years 5 months ago
Modelling layer 2 and layer 3 device bandwidths using B-node theory
Modern computer networks contain an amalgamation of devices and technologies, with the performance exhibited by each central to digital communications. Varieties of methods exist ...
S. Cikara, Stanislaw P. Maj, David T. Shaw
GLOBECOM
2006
IEEE
14 years 5 months ago
Modelling the Impact of User Mobility on the Throughput in Networks of Wireless 802.11 LANs
— The wireless LAN technology 802.11, also called Wi-Fi, offers high speed wireless Internet access for local area environments. WLANs provide much higher data rates than the mob...
Sandjai Bhulai, Robert D. van der Mei, Taoying Yua...
IROS
2006
IEEE
151views Robotics» more  IROS 2006»
14 years 5 months ago
Robust Feature Correspondences for Vision-Based Navigation with Slow Frame-Rate Cameras
— We propose a vision-based inertial system that overcomes the problems associated with slow update rates in navigation systems based on high-resolution cameras. Due to bandwidth...
Darius Burschka
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 5 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
JCDL
2006
ACM
141views Education» more  JCDL 2006»
14 years 5 months ago
An architecture for the aggregation and analysis of scholarly usage data
Although recording of usage data is common in scholarly information services, its exploitation for the creation of valueadded services remains limited due to concerns regarding, a...
Johan Bollen, Herbert Van de Sompel