Sciweavers

551 search results - page 19 / 111
» The Complexity of Andersen's Analysis in Practice
Sort
View
ACSAC
2005
IEEE
14 years 29 days ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
DATE
2007
IEEE
110views Hardware» more  DATE 2007»
14 years 1 months ago
Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis
Abstract— Modern integrated radio systems require highly linear analog/RF circuits. Two-tone simulations are commonly used to study a circuit’s nonlinear behavior. Very often, ...
Jonathan Borremans, Ludwig De Locht, Piet Wambacq,...
CSCW
2008
ACM
13 years 9 months ago
Articulations of wikiwork: uncovering valued work in wikipedia through barnstars
Successful online communities have complex cooperative arrangements, articulations of work, and integration practices. They require technical infrastructure to support a broad div...
Travis Kriplean, Ivan Beschastnikh, David W. McDon...
MOBIHOC
2008
ACM
14 years 7 months ago
Complexity in wireless scheduling: impact and tradeoffs
It has been an important research topic since 1992 to maximize stability region in constrained queueing systems, which includes the study of scheduling over wireless ad hoc networ...
Yung Yi, Alexandre Proutiere, Mung Chiang
RECOMB
2006
Springer
14 years 7 months ago
A Study of Accessible Motifs and RNA Folding Complexity
mRNA molecules are folded in the cells and therefore many of their substrings may actually be inaccessible to protein and microRNA binding. The need to apply an accessability crite...
Ydo Wexler, Chaya Ben-Zaken Zilberstein, Michal Zi...