Sciweavers

14424 search results - page 175 / 2885
» Modeling Radio Networks
Sort
View
133
Voted
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 9 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
148
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Characterizing geospatial dynamics of application usage in a 3G cellular data network
—Recent studies on cellular network measurement have provided the evidence that significant geospatial correlations, in terms of traffic volume and application access, exist in...
Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, J...
130
Voted
JCM
2007
105views more  JCM 2007»
15 years 3 months ago
Generalization Capabilities Enhancement of a Learning System by Fuzzy Space Clustering
Abstract— We have used measurements taken on real network to enhance the performance of our radio network planning tool. A distribution learning technique is adopted to realize t...
Zakaria Nouir, Berna Sayraç, Benoît F...
164
Voted
EDBT
2012
ACM
216views Database» more  EDBT 2012»
13 years 5 months ago
Effectively indexing the multi-dimensional uncertain objects for range searching
The range searching problem is fundamental in a wide spectrum of applications such as radio frequency identification (RFID) networks, location based services (LBS), and global po...
Ying Zhang, Wenjie Zhang, Qianlu Lin, Xuemin Lin
ZUM
1998
Springer
111views Formal Methods» more  ZUM 1998»
15 years 7 months ago
Combining Specification Techniques for Processes, Data and Time
Abstract. We present a new combination CSP-OZ-DC of three well researched formal techniques for the specification of processes, data and time: CSP [17], Object-Z [36], and Duration...
Ernst-Rüdiger Olderog