Sciweavers

773 search results - page 154 / 155
» Program Slicing by Calculation
Sort
View
TMC
2010
179views more  TMC 2010»
13 years 4 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
EUSFLAT
2009
196views Fuzzy Logic» more  EUSFLAT 2009»
13 years 3 months ago
Organizational Risk Assessment using Adaptive Neuro-Fuzzy Inference System
In this paper a fuzzy model based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is introduced for calculating the level of risk in managerial problems. In this model, affecting ...
Javad J. Jassbi, Sohrab Khanmohammadi
WICOMM
2011
13 years 21 days ago
A pragmatic approach to area coverage in hybrid wireless sensor networks
Success of Wireless Sensor Networks (WSN) largely depends on whether the deployed network can provide desired area coverage with acceptable network lifetime. This paper seeks to a...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
IGARSS
2010
13 years 18 days ago
Enhanced Cloud algorithm from collocated CALIPSO, CloudSat and MODIS global boundary layer lapse rate studies
Coincident profile information from CALIPSO's lidar and CloudSat's radar offers a unique opportunity to map the vertical structure of clouds over the globe with accuraci...
Sunny Sun-Mack, Patrick Minnis, Seiji Kato, Yan Ch...
BMCBI
2011
13 years 8 days ago
Multithreaded comparative RNA secondary structure prediction using stochastic context-free grammars
Background: The prediction of the structure of large RNAs remains a particular challenge in bioinformatics, due to the computational complexity and low levels of accuracy of state...
Zsuzsanna Sukosd, Bjarne Knudsen, Morten Vaerum, J...