Sciweavers

483 search results - page 59 / 97
» Reachability Analysis of Hybrid Systems Using Support Functi...
Sort
View
BROADNETS
2005
IEEE
14 years 4 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
ASC
2004
13 years 10 months ago
Soft computing applications in dynamic model identification of polymer extrusion process
This paper proposes the applications of soft computing to deal with the constraints in conventional modelling techniques of the dynamic extrusion process. The proposed technique i...
Leong Ping Tan, Ahmad Lotfi, Eugene Lai, J. B. Hul...
FDL
2006
IEEE
14 years 5 months ago
Bridging the Gap Between SysML and Design Space Exploration
In the last few years the embedded systems design discipline required new design methodologies and new specification languages to support system engineers in developing heterogen...
Mauro Prevostini, Sivakumar Ganesan
ALIFE
2006
13 years 11 months ago
Through the Interaction of Neutral and Adaptive Mutations, Evolutionary Search Finds a Way
An evolutionary system that supports the interaction of neutral and adaptive mutations is investigated. Experimental results on a Boolean function and needle-in-haystack problems s...
Tina Yu, Julian Francis Miller
PLDI
1997
ACM
14 years 3 months ago
Componential Set-Based Analysis
Set-based analysis is a constraint-based whole program analysis that is applicable to functional and objectoriented programming languages. Unfortunately, the analysis is useless f...
Cormac Flanagan, Matthias Felleisen