Sciweavers

9842 search results - page 1567 / 1969
» Compositional timing analysis
Sort
View
BROADNETS
2005
IEEE
15 years 10 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
CEC
2005
IEEE
15 years 10 months ago
Dynamic niching in evolution strategies with covariance matrix adaptation
Abstract- Evolutionary Algorithms (EAs) have the tendency to converge quickly into a single solution in the search space. However, many complex search problems require the identiļ¬...
Ofer M. Shir, Thomas Bäck
CEC
2005
IEEE
15 years 10 months ago
Single parent genetic programming
The most controversial part of genetic programming is its highly disruptive and potentially innovative subtree crossover operator. The clearest problem with the crossover operator...
Wendy Ashlock, Dan Ashlock
CIMCA
2005
IEEE
15 years 10 months ago
Modeling the Cross-Cultural Adaptation Process of Immigrants Using Categorical Data Clustering
— This paper introduces a quantitative method for social data analysis, which is based on the use of categorical data clustering. More specifically, we employ categorical data cl...
George E. Tsekouras
COLCOM
2005
IEEE
15 years 10 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
« Prev « First page 1567 / 1969 Last » Next »