Sciweavers

14 search results - page 3 / 3
» Evaluation of Parameter Sensitivity for Portable Embedded Sy...
Sort
View
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
13 years 11 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
ASC
2004
13 years 5 months ago
Soft computing applications in dynamic model identification of polymer extrusion process
This paper proposes the applications of soft computing to deal with the constraints in conventional modelling techniques of the dynamic extrusion process. The proposed technique i...
Leong Ping Tan, Ahmad Lotfi, Eugene Lai, J. B. Hul...
WSC
2004
13 years 6 months ago
A Data Warehouse Environment for Storing and Analyzing Simulation Output Data
Discrete event simulation modelling has been extensively used in modelling complex systems. Although it offers great conceptual-modelling flexibility, it is both computationally e...
Christos Vasilakis, Elia El-Darzi, Panagiotis Chou...
SSD
1999
Springer
106views Database» more  SSD 1999»
13 years 9 months ago
XZ-Ordering: A Space-Filling Curve for Objects with Spatial Extension
There is an increasing need to integrate spatial index structures into commercial database management systems. In geographic information systems (GIS), huge amounts of information ...
Christian Böhm, Gerald Klump, Hans-Peter Krie...