Sciweavers

2044 search results - page 154 / 409
» System theory for numerical analysis
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
14 years 11 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
TSP
2010
14 years 11 months ago
Analysis of the Stereophonic LMS/Newton Algorithm and Impact of Signal Nonlinearity on Its Convergence Behavior
The strong cross-correlation that exists between the two input audio channels makes the problem of stereophonic acoustic echo cancellation (AEC) complex and challenging to solve. R...
Harsha I. K. Rao, Behrouz Farhang-Boroujeny
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 8 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
INFOCOM
2005
IEEE
15 years 10 months ago
A cost-based analysis of overlay routing geometries
— In this paper, we propose a cost-based model to evaluate the resources that each node has to contribute for participating in an overlay network. Such a cost model allows to gau...
Nicolas Christin, John Chuang
PE
2006
Springer
130views Optimization» more  PE 2006»
15 years 4 months ago
Analysis of resource transfers in peer-to-peer file sharing applications using fluid models
This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred...
Rossano Gaeta, Marco Gribaudo, Daniele Manini, Mat...