Sciweavers

3052 search results - page 57 / 611
» On the Verification of the Gravity Model Used for Mobility M...
Sort
View
ICCAD
1999
IEEE
81views Hardware» more  ICCAD 1999»
13 years 12 months ago
Modeling design constraints and biasing in simulation using BDDs
Constraining and input biasing are frequently used techniques in functional verification methodologies based on randomized simulation generation. Constraints confine the simulatio...
Jun Yuan, Kurt Shultz, Carl Pixley, Hillel Miller,...
MOBICOM
2003
ACM
14 years 27 days ago
Towards realistic mobility models for mobile ad hoc networks
One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. Simulation provides researchers with a number...
Amit P. Jardosh, Elizabeth M. Belding-Royer, Kevin...
SIMPRA
2010
95views more  SIMPRA 2010»
13 years 6 months ago
State-dependent stochastic mobility model in mobile communication networks
Abstract — We apply finite state-dependent queueing networks to model mobility in mobile communication systems. Although they have been successfully used in the past to model ve...
Frederico R. B. Cruz, P. C. Oliveira, Luiz Duczmal
HASE
2008
IEEE
13 years 7 months ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
ICDAR
2003
IEEE
14 years 28 days ago
On-line Signature Verification Using Local Shape Analysis
This paper presents a novel approach to the on-line signature verification using local shape Analysis. First, segment the input signature into several segments using HMM (Hidden M...
Mingfu Zou, Jianjun Tong, Changping Liu, Zhenglian...