Sciweavers

175 search results - page 16 / 35
» Password policy simulation and analysis
Sort
View
WSC
2007
13 years 11 months ago
An analysis of tool capabilities in the photolithography area of an ASIC fab
Photolithography is generally regarded as the most constraining element in semiconductor manufacturing. This is primarily attributable to the high capital investment and extensive...
P. J. Byrne, Cathal Heavey, Kamil Erkan Kabak
GLOBECOM
2006
IEEE
14 years 3 months ago
Fast Stochastic Analysis of P2P File Distribution Architectures
— In this paper we investigate which is the most efficient architecture and protocol that can be used for file distribution. The focus of the analysis is to understand not only...
Damiano Carra, Renato Lo Cigno, Ernst W. Biersack
ICML
2010
IEEE
13 years 10 months ago
Asymptotic Analysis of Generative Semi-Supervised Learning
Semi-supervised learning has emerged as a popular framework for improving modeling accuracy while controlling labeling cost. Based on an extension of stochastic composite likeliho...
Joshua Dillon, Krishnakumar Balasubramanian, Guy L...
TON
2012
11 years 11 months ago
Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis
—The deployment of cognitive radio networks enables efficient spectrum sharing and opportunistic spectrum access. It also presents new challenges to the classical problem of int...
Siamak Sorooshyari, Chee Wei Tan, Mung Chiang
AIMS
2008
Springer
14 years 3 months ago
Dynamic Consistency Analysis for Convergent Operators
It has been shown that sets of convergent operators with a shared fixed point can simulate autonomic control mechanisms, but many questions remain about this management technique....
Alva L. Couch, Marc Chiarini