Sciweavers

7272 search results - page 1421 / 1455
» On the Performance of Selection Relaying
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 9 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CORR
2008
Springer
213views Education» more  CORR 2008»
13 years 9 months ago
Between conjecture and memento: shaping a collective emotional perception of the future
Abstract Microblogging is a form of online communication by which users broadcast brief text updates, also known as tweets, to the public or a selected circle of contacts. A varieg...
Alberto Pepe, Johan Bollen
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 9 months ago
Collaborative Spectrum Sensing from Sparse Observations in Cognitive Radio Networks
Spectrum sensing, which aims at detecting spectrum holes, is the precondition for the implementation of cognitive radio. Collaborative spectrum sensing among the cognitive radio n...
Jia Meng, Wotao Yin, Husheng Li, Ekram Hossain, Zh...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 9 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CSDA
2008
128views more  CSDA 2008»
13 years 9 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
« Prev « First page 1421 / 1455 Last » Next »