Sciweavers

2500 search results - page 194 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
149
Voted
UAI
2004
15 years 5 months ago
Sensitivity Analysis in Bayesian Networks: From Single to Multiple Parameters
Previous work on sensitivity analysis in Bayesian networks has focused on single parameters, where the goal is to understand the sensitivity of queries to single parameter changes...
Hei Chan, Adnan Darwiche
164
Voted
CONCUR
2010
Springer
15 years 3 months ago
Trust in Anonymity Networks
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusi...
Vladimiro Sassone, Sardaouna Hamadou, Mu Yang
143
Voted
GLVLSI
2007
IEEE
173views VLSI» more  GLVLSI 2007»
15 years 3 months ago
Modeling and estimating leakage current in series-parallel CMOS networks
This paper reviews the modeling of subthreshold leakage current and proposes an improved model for general series-parallel CMOS networks. The presence of on-switches in off-networ...
Paulo F. Butzen, André Inácio Reis, ...
123
Voted
IJDE
2007
77views more  IJDE 2007»
15 years 3 months ago
Session Based Packet Marking and Auditing for Network Forensics
The widely acknowledged problem of reliably identifying the origin of network data has been the subject of many research works. Due to the nature of Internet Protocol, a source IP...
Omer Demir, Ping Ji, Jinwoo Kim
99
Voted
IJON
2002
67views more  IJON 2002»
15 years 3 months ago
Test of spike-sorting algorithms on the basis of simulated network data
: Results of spike sorting algorithms are usually compared against recorded signals which themselves underly interpretations, distortions and errors. Our approach is to provide and...
Kerstin M. L. Menne, Andre Folkers, Thomas Malina,...