Sciweavers

759 search results - page 51 / 152
» Identifying Modeling Errors in Signatures by Model Checking
Sort
View
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 3 months ago
Service Roaming over Mobile Networks: A Reality Check
—Today, international mobile roaming (IMR) is experiencing changes both in terms of technology and business models. Traditionally, voice and SMS have been the only services offer...
K. R. Renjish Kumar
ACSAC
2002
IEEE
14 years 1 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
GECCO
2003
Springer
123views Optimization» more  GECCO 2003»
14 years 2 months ago
Benefits of Implicit Redundant Genetic Algorithms for Structural Damage Detection in Noisy Environments
A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problem...
Anne M. Raich, Tamás Liszkai
LICS
2007
IEEE
14 years 3 months ago
The Cost of Punctuality
In an influential paper titled “The Benefits of Relaxing Punctuality” [2], Alur, Feder, and Henzinger introduced Metric Interval Temporal Logic (MITL) as a fragment of the r...
Patricia Bouyer, Nicolas Markey, Joël Ouaknin...
CLUSTER
2006
IEEE
14 years 21 days ago
Modeling Network Contention Effects on All-to-All Operations
One of the most important collective communication patterns used in scientific applications is the complete exchange, also called All-to-All. Although efficient complete exchange ...
Luiz Angelo Steffenel