Sciweavers

8177 search results - page 1428 / 1636
» Detecting System Emulators
Sort
View
WCNC
2008
IEEE
15 years 10 months ago
A Stochastic Model for Misbehaving Relays in Cooperative Diversity
—Existing cooperative diversity protocols are designed with the inherent assumption that users exhibit cooperative behavior all the time. However, in a practical cooperative wire...
Sintayehu Dehnie, Nasir D. Memon
WCNC
2008
IEEE
15 years 10 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
ANSS
2007
IEEE
15 years 10 months ago
The JMT Simulator for Performance Evaluation of Non-Product-Form Queueing Networks
This paper describes JSIM: the simulation module of the Java Modelling Tools (JMT), an open-source fully-portable Java suite for capacity planning studies. The simulator has been ...
Marco Bertoli, Giuliano Casale, Giuseppe Serazzi
AVSS
2007
IEEE
15 years 10 months ago
On the effect of motion segmentation techniques in description based adaptive video transmission
This paper presents the results of analysing the effect of different motion segmentation techniques in a system that transmits the information captured by a static surveillance ca...
Juan Carlos San Miguel, José María M...
BROADNETS
2007
IEEE
15 years 10 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
« Prev « First page 1428 / 1636 Last » Next »