Sciweavers

2092 search results - page 229 / 419
» A Theory of Non-Deterministic Networks
Sort
View
91
Voted
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 6 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
PODC
2006
ACM
15 years 6 months ago
Timeliness, failure-detectors, and consensus performance
We study the implication that various timeliness and failure detector assumptions have on the performance of consensus algorithms that exploit them. We present a general framework...
Idit Keidar, Alexander Shraer
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 6 months ago
The Erlang model with non-poisson call arrivals
The Erlang formula is known to be insensitive to the holding time distribution beyond the mean. While calls are generally assumed to arrive as a Poisson process, we prove that it ...
Thomas Bonald
90
Voted
ICANN
2005
Springer
15 years 6 months ago
A Gradient Rule for the Plasticity of a Neuron's Intrinsic Excitability
While synaptic learning mechanisms have always been a core topic of neural computation research, there has been relatively little work on intrinsic learning processes, which change...
Jochen Triesch
RE
2006
Springer
15 years 14 days ago
A Coordination Complexity Model to Support Requirements Engineering for Cross-organizational ERP
Cross-organizational information systems projects, such as ERP, imply an expensive requirements engineering (RE) cycle. Little is known yet about how to carry it out with more pre...
Maya Daneva, Roel Wieringa