Sciweavers

817 search results - page 130 / 164
» Malware behaviour analysis
Sort
View
LCN
2005
IEEE
15 years 5 months ago
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
Paal Engelstad, Olav N. Østerbø
MSWIM
2005
ACM
15 years 5 months ago
An analytical model of the virtual collision handler of 802.11e
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
Paal E. Engelstad, Olav N. Østerbø
INEX
2004
Springer
15 years 5 months ago
The Interactive Track at INEX 2004
An interactive track was included in INEX for the first time in 2004. The main aim of the track was to study the behaviour of searchers when interacting with components of XML doc...
Anastasios Tombros, Birger Larsen, Saadia Malik
AINA
2010
IEEE
15 years 4 months ago
Towards Adaptive Mobile Mashups: Opportunities for Designing Effective Persuasive Technology on the Road
— Today’s vehicles and on-road infrastructures are equipped with a large number of sophisticated sensory devices. These sensory devices are capable of monitoring and providing ...
Flora Dilys Salim
ZUM
1997
Springer
125views Formal Methods» more  ZUM 1997»
15 years 4 months ago
A Formal OO Method Inspired by Fusion and Object-Z
We present a new formal OO method, called FOX, which is a synergetic combination of the semi-formal Fusion method and the formal specification language Object-Z. To manage complex...
Klaus Achatz, Wolfram Schulte