Sciweavers

861 search results - page 88 / 173
» Predicting Attack-prone Components
Sort
View
AIHC
2007
Springer
14 years 5 months ago
Human Computing and Machine Understanding of Human Behavior: A Survey
A widely accepted prediction is that computing will move to the background, weaving itself into the fabric of our everyday living spaces and projecting the human user into the for...
Maja Pantic, Alex Pentland, Anton Nijholt, Thomas ...
ICSEA
2006
IEEE
14 years 4 months ago
Testing a Network by Inferring Representative State Machines from Network Traces
— This paper describes an innovative approach to network testing based on automatically generating and analyzing state machine models of network behavior. The models are generate...
Nancy D. Griffeth, Yuri Cantor, Constantinos Djouv...
LCN
2006
IEEE
14 years 4 months ago
Experimental investigation on VoIP performance and the resource utilization in 802.11b WLANs
In a shared medium network like the 802.11b WLAN, predicting the quality of VoIP calls from the resource usage of the wireless medium is highly desirable. Analyzing the bandwidth ...
Miroslaw Narbutt, Mark Davis
ADHOCNOW
2006
Springer
14 years 4 months ago
Evaluation of the Energy Consumption in MANET
In ad hoc mobile wireless networks, energy consumption is an important issue as most mobile hosts operate on limited battery resources. Existing models for evaluating the energy co...
Géraud Allard, Pascale Minet, Dang-Quan Ngu...
ICPPW
2005
IEEE
14 years 4 months ago
A Practical Approach to the Rating of Barrier Algorithms Using the LogP Model and Open MPI
Large–scale parallel applications performing global synchronization may spend a significant amount of execution time waiting for the completion of a barrier operation. Conseque...
Torsten Hoefler, Lavinio Cerquetti, Torsten Mehlan...