Sciweavers

1336 search results - page 122 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
211
Voted
SIGMOD
2006
ACM
149views Database» more  SIGMOD 2006»
16 years 3 months ago
Efficient query processing on unstructured tetrahedral meshes
Modern scientific applications consume massive volumes of data produced by computer simulations. Such applications require new data management capabilities in order to scale to te...
Stratos Papadomanolakis, Anastassia Ailamaki, Juli...
139
Voted
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 10 months ago
Throughput and Delay Analysis of Multihop IEEE 802.11 Networks with Capture
In this paper, we present an analytical model for the approximate calculation of the throughput and end-toend delay performance in single hop and multihop IEEE 802.11 networks unde...
Rima Khalaf, Izhak Rubin, Ju-Lan Hsu
127
Voted
ICDAR
2007
IEEE
15 years 10 months ago
Language Models for Handwritten Short Message Services
Handwriting is an alternative method for entering texts composing Short Message Services. However, a whole new language features the texts which are produced. They include for ins...
Emmanuel Prochasson, Christian Viard-Gaudin, Emman...
124
Voted
ENTCS
2008
175views more  ENTCS 2008»
15 years 3 months ago
AGAPIA v0.1: A Programming Language for Interactive Systems and Its Typing System
A model (consisting of rv-systems), a core programming language (for developing rv-programs), several specification and analysis techniques appropriate for modeling, programming a...
Cezara Dragoi, Gheorghe Stefanescu
142
Voted
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...