Sciweavers

674 search results - page 89 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
SFM
2007
Springer
14 years 3 months ago
Tackling Large State Spaces in Performance Modelling
Stochastic performance models provide a powerful way of capturing and analysing the behaviour of complex concurrent systems. Traditionally, performance measures for these models ar...
William J. Knottenbelt, Jeremy T. Bradley
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 9 months ago
From Multi-Keyholes to Measure of Correlation and Power Imbalance in MIMO Channels: Outage Capacity Analysis
An information-theoretic analysis of a multi-keyhole channel, which includes a number of statistically independent keyholes with possibly different correlation matrices, is given. ...
George Levin, Sergey Loyka
COMCOM
2011
13 years 4 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
VTC
2007
IEEE
200views Communications» more  VTC 2007»
14 years 3 months ago
General Analysis of Uplink Group-Orthogonal MC-CDMA systems
Abstract—Group-orthogonal multicarrier code-division multiple access (GO-MC-CDMA) has been proposed as a multiplexing technique for the uplink segment of wireless systems. The di...
Guillem Femenias, Felip Riera-Palou, Jaume Ramis
SIGSOFT
2006
ACM
14 years 9 months ago
Local analysis of atomicity sphere for B2B collaboration
Atomicity is a desirable property for business processes to conduct transactions in Business-to-Business (B2B) collaboration. Although it is possible to reason about atomicity of ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu