Sciweavers

2286 search results - page 372 / 458
» Statistical timing analysis based on a timing yield model
Sort
View
167
Voted
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 8 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
226
Voted
JORS
2010
189views more  JORS 2010»
14 years 11 months ago
Monte Carlo scenario generation for retail loan portfolios
Monte Carlo simulation is a common method for studying the volatility of market traded instruments. It is less employed in retail lending, because of the inherent nonlinearities in...
J. L. Breeden, D. Ingram
154
Voted
IFIP
2004
Springer
15 years 10 months ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens
117
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Flow Scheduling for End-Host Multihoming
Abstract— Fueled by the competing DSL and Cable technologies, residential broadband access has seen a significant spread in availability to the point that many users have a choi...
Nathanael Thompson, Guanghui He, Haiyun Luo
161
Voted
TSP
2008
149views more  TSP 2008»
15 years 4 months ago
Decentralized Quantized Kalman Filtering With Scalable Communication Cost
Estimation and tracking of generally nonstationary Markov processes is of paramount importance for applications such as localization and navigation. In this context, ad hoc wireles...
Eric J. Msechu, Stergios I. Roumeliotis, Alejandro...