Sciweavers

2740 search results - page 341 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
125
Voted
IJISEC
2008
119views more  IJISEC 2008»
15 years 3 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
129
Voted
IJWET
2008
98views more  IJWET 2008»
15 years 3 months ago
Warehousing complex data from the web
: Data warehousing and Online Analytical Processing (OLAP) technologies are now moving onto handling complex data that mostly originate from the web. However, integrating such data...
Omar Boussaid, Jérôme Darmont, Fadila...
IJSN
2006
124views more  IJSN 2006»
15 years 3 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
119
Voted
JCM
2007
114views more  JCM 2007»
15 years 3 months ago
Tunable Pulse Amplitude and Position Modulation Technique for Reliable Optical Wireless Communication Channels
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
122
Voted
JCT
2007
117views more  JCT 2007»
15 years 3 months ago
Large independent sets in regular graphs of large girth
Let G be a d-regular graph with girth g, and let α be the independence number of G. We show that α(G) ≥ 1 2 1 − (d − 1)−2/(d−2) − (g) n where (g) → 0 as g → ∞,...
Joseph Lauer, Nicholas C. Wormald