Sciweavers

2169 search results - page 392 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
SASN
2006
ACM
14 years 2 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
CIARP
2005
Springer
14 years 2 months ago
Development and Validation of an Algorithm for Cardiomyocyte Beating Frequency Determination
The Chagas disease or Tripanosomiasis Americana affects between 16 and 18 million people in endemic areas. This disease affects the beating rate of infected patients’ cardiomyocy...
Demian Wassermann, Marta Mejail
SIGCOMM
2004
ACM
14 years 2 months ago
Optimizing cost and performance for multihoming
Multihoming is often used by large enterprises and stub ISPs to connect to the Internet. In this paper, we design a series of novel smart routing algorithms to optimize cost and p...
David Kiyoshi Goldenberg, Lili Qiu, Haiyong Xie 00...
CIKM
2004
Springer
14 years 2 months ago
Indexing text data under space constraints
An important class of queries is the LIKE predicate in SQL. In the absence of an index, LIKE queries are subject to performance degradation. The notion of indexing on substrings (...
Bijit Hore, Hakan Hacigümüs, Balakrishna...
HIPC
2003
Springer
14 years 2 months ago
Double-Loop Feedback-Based Scheduling Approach for Distributed Real-Time Systems
The use of feedback control techniques has been gaining importance in real-time scheduling as a means to provide predictable performance in the face of uncertain workload. In this ...
Suzhen Lin, G. Manimaran