Sciweavers

21324 search results - page 164 / 4265
» Making the case for computing
Sort
View
IESS
2009
Springer
131views Hardware» more  IESS 2009»
15 years 8 months ago
Characterization of Inaccessibility in Wireless Networks: A Case Study on IEEE 802.15.4 Standard
Wireless technology has been seen as the communication technology of the future. One of many challenges is the support for predictability and time-bounded communications over this ...
Jeferson L. R. Souza, José Rufino
118
Voted
ICICS
2001
Springer
15 years 7 months ago
Quantifying Network Denial of Service: A Location Service Case Study
Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this p...
Yan Chen, Adam W. Bargteil, David Bindel, Randy H....
115
Voted
CORR
2006
Springer
111views Education» more  CORR 2006»
15 years 3 months ago
Length-based cryptanalysis: The case of Thompson's Group
The length-based approach is a heuristic for solving randomly generated equations in groups which possess a reasonably behaved length function. We describe several improvements of ...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
JUCS
2008
128views more  JUCS 2008»
15 years 3 months ago
Integrating Dialog Modeling and Domain Modeling - the Case of Diamodl and the Eclipse Modeling Framework
: For most applications, data-intensive applications in particular, dialog modeling makes little sense without a domain model. Since domain models usually are developed and used ou...
Hallvard Trætteberg
TC
2010
14 years 10 months ago
Speculatively Redundant Continued Logarithm Representation
Continued logarithms, as originally introduced by Gosper, represent a means for exact rational arithmetic, but their application to exact real arithmetic is limited by the uniquene...
Tomas Brabec