Sciweavers

13631 search results - page 473 / 2727
» Event-Based Performance Analysis
Sort
View
FC
2010
Springer
145views Cryptology» more  FC 2010»
15 years 3 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
ISVC
2010
Springer
15 years 3 months ago
Acquisition Scenario Analysis for Face Recognition at a Distance
An experimental analysis of three acquisition scenarios for face recognition at a distance is reported, namely: close, medium, and far distance between camera and query face, the t...
Pedro Tome-Gonzalez, Julian Fiérrez-Aguilar...
TMC
2010
137views more  TMC 2010»
15 years 3 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
143
Voted
PIMRC
2010
IEEE
15 years 3 months ago
Communication cost analysis of MBSFN in LTE
Long Term Evolution (LTE) is the latest step towards the 4th generation (4G) of radio technologies designed to increase the capacity and speed of mobile communications. To support ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
153
Voted
PTS
2010
167views Hardware» more  PTS 2010»
15 years 3 months ago
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases
The addition of a cross-cutting concern in a program, through aspect weaving, has an impact on its existing behaviors. If test cases exist for the program, it is necessary to ident...
Romain Delamare, Freddy Munoz, Benoit Baudry, Yves...