Sciweavers

13043 search results - page 2298 / 2609
» Simulation of the research process
Sort
View
JSAC
2006
103views more  JSAC 2006»
15 years 4 months ago
Performance analysis of M-ary PPM TH-UWB systems in the presence of MUI and timing jitter
The symbol error probability (SEP) performance of time-hopping (TH) ultra-wideband (UWB) systems in the presence of multiuser interference (MUI) and timing jitter is considered wit...
N. V. Kokkalis, P. Takis Mathiopoulos, George K. K...
JSAC
2006
128views more  JSAC 2006»
15 years 4 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
JSAC
2006
163views more  JSAC 2006»
15 years 4 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood
ENTCS
2007
117views more  ENTCS 2007»
15 years 4 months ago
Relating Hybrid Chi to Other Formalisms
The hybrid χ (Chi) formalism is suited to modeling, simulation and verification of hybrid systems. It integrates concepts from dynamics and control theory with concepts from com...
D. A. van Beek, J. E. Rooda, Ramon R. H. Schiffele...
JUCS
2006
146views more  JUCS 2006»
15 years 4 months ago
Health Monitoring and Assistance to Support Aging in Place
: To many people, home is a sanctuary. For those people who need special medical care, they may need to be pulled out of their home to meet their medical needs. As the population a...
Diane J. Cook
« Prev « First page 2298 / 2609 Last » Next »