Sciweavers

634 search results - page 37 / 127
» Groundwork for Weak Analysis
Sort
View
ICASSP
2011
IEEE
14 years 5 months ago
A novel tracking analysis of the Normalized Least Mean Fourth algorithm
In this work, the tracking analysis of the Normalized Least Mean Fourth (NLMF) algorithm is investigated for a random walk channel under very weak assumptions. The novelty of this...
Muhammad Moinuddin, Azzedine Zerguine
ICYCS
2008
IEEE
15 years 8 months ago
VM-based Architecture for Network Monitoring and Analysis
A single physical machine provides multiple network monitoring and analysis services (e.g., IDS, QoS) which are installed on the same operating system. Isolation between services ...
Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li
131
Voted
HASE
2007
IEEE
15 years 8 months ago
Integrating Product-Line Fault Tree Analysis into AADL Models
Fault Tree Analysis (FTA) is a safety-analysis technique that has been recently extended to accommodate product-line engineering for critical domains. This paper describes a tool-...
Hongyu Sun, Miriam Hauptman, Robyn R. Lutz
115
Voted
ICCCN
2007
IEEE
15 years 8 months ago
Outage Analysis of a University Campus Network
—Understanding outage and failure characteristics of a network is important to assess the availability of the network, determine failure source for trouble-shooting, and identify...
Baek-Young Choi, Sejun Song, George Koffler, Deep ...
95
Voted
FSE
2005
Springer
85views Cryptology» more  FSE 2005»
15 years 7 months ago
Analysis of the Non-linear Part of Mugi
This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in it...
Alex Biryukov, Adi Shamir