Sciweavers

1846 search results - page 86 / 370
» Geographically-Sensitive Link Analysis
Sort
View
MSWIM
2000
ACM
15 years 8 months ago
Performance analysis of mobile agents for filtering data streams on wireless networks
Wireless networks are an ideal environment for mobile agents, because their mobility allows them to move across an unreliable link to reside on a wired host, next to or closer to ...
David Kotz, Guofei Jiang, Robert S. Gray, George C...
APNOMS
2006
Springer
15 years 7 months ago
Performance Analysis of an Adaptive Soft Handoff Algorithm for Mobile Cellular Systems
In this paper, an adaptive soft handoff algorithm, which dynamically calculates the threshold values for soft handoff based on the received signal strength, is proposed for mobile ...
Huamin Zhu, Kyung Sup Kwak
DAGSTUHL
2003
15 years 5 months ago
Traceability and Evaluation in Scenario Analysis by Use Case Maps
The Use Case Map (UCM) scenario notation has some strong features related to rapid capture and evaluation of requirements models. In this paper, we explain how a UCM model was deve...
Dorin Bogdan Petriu, Daniel Amyot, C. Murray Woods...
IJCV
1998
121views more  IJCV 1998»
15 years 3 months ago
Continuous Time Matching Constraints for Image Streams
Corresponding image points of a rigid object in a discrete sequence of images fulfil the so-called multilinear constraint. In this paper the continuous time analogue of this const...
Kalle Åström, Anders Heyden
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
15 years 3 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler