Sciweavers

1852 search results - page 98 / 371
» Block-level link analysis
Sort
View
ICCBR
2007
Springer
15 years 6 months ago
An Analysis of Case-Based Value Function Approximation by Approximating State Transition Graphs
We identify two fundamental points of utilizing CBR for an adaptive agent that tries to learn on the basis of trial and error without a model of its environment. The first link co...
Thomas Gabel, Martin Riedmiller
108
Voted
VTC
2006
IEEE
122views Communications» more  VTC 2006»
15 years 6 months ago
Analysis of Capacity Improvements in Multi-Radio Wireless Mesh Networks
In this paper, we argue that additional radios should be placed according to the distribution of traffic load in WMN. We show that the capacity of a WMN is constrained by the bottl...
Bassam Aoun, Raouf Boutaba, Gary W. Kenward
ACISP
2005
Springer
15 years 6 months ago
Security Analysis and Fix of an Anonymous Credential System
Anonymous credentials are an important privacy-enhancing technique that allows users to convince a service provider of their legitimacy for service accesses in an anonymous manner....
Yanjiang Yang, Feng Bao, Robert H. Deng
110
Voted
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
15 years 6 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
95
Voted
ICIC
2005
Springer
15 years 6 months ago
Analysis of SCTP Handover by Movement Patterns
Stream Control Transmission Protocol (SCTP) is a new end-to-end transport protocol, which can be used to support the mobility of mobile terminals. This paper describes a framework ...
Dong Phil Kim, Seok Joo Koh, Sang Wook Kim