Sciweavers

3614 search results - page 605 / 723
» Numerical Computing with MATLAB
Sort
View
TMC
2011
164views more  TMC 2011»
14 years 8 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
ECEASST
2010
14 years 8 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
106
Voted
JDCTA
2010
143views more  JDCTA 2010»
14 years 8 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
JNS
2010
55views more  JNS 2010»
14 years 8 months ago
Initiation of Cracks in Griffith's Theory: An Argument of Continuity in Favor of Global Minimization
The initiation of a crack in a sound body is a real issue in the setting of Griffith's theory of brittle fracture. If one uses the concept of critical energy release rate (Gri...
Jean-Jacques Marigo
103
Voted
MMAS
2010
Springer
14 years 8 months ago
Simplified Modelling of a Thermal Bath, with Application to a Fluid Vortex System
Based on the thermodynamic concept of a reservoir, we investigate a computational model for interaction with unresolved degrees of freedom (a thermal bath). We assume that a finite...
Svetlana Dubinkina, Jason Frank, Ben Leimkuhler