Sciweavers

1960 search results - page 183 / 392
» The Logic of Large Enough
Sort
View
CSMR
2007
IEEE
14 years 3 months ago
Verifying the Concept of Union Slices on Java Programs
Static program slicing is often proposed for software maintenance-related tasks. Due to different causes static slices are in many cases overly conservative and hence too large to...
Attila Szegedi, Tamás Gergely, Árp&a...
GLOBECOM
2007
IEEE
14 years 3 months ago
On the (in)Effectiveness of Probabilistic Marking for IP Traceback Under DDoS Attacks
—Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet. The most studied solution is to let routers probabilistically mark packets with partial path...
Vamsi Paruchuri, Arjan Durresi, Raj Jain
IAT
2007
IEEE
14 years 3 months ago
Negotiation Dynamics: Analysis, Concession Tactics, and Outcomes
Given that a negotiation outcome is determined to a large extent by the successive offers exchanged by negotiating agents, it is useful to analyze dynamic patterns of the bidding,...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 3 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
IJCNN
2007
IEEE
14 years 3 months ago
Compact hardware for real-time speech recognition using a Liquid State Machine
Abstract— Hardware implementations of Spiking Neural Networks are numerous because they are well suited for implementation in digital and analog hardware, and outperform classic ...
Benjamin Schrauwen, Michiel D'Haene, David Verstra...