Sciweavers

175 search results - page 22 / 35
» Password policy simulation and analysis
Sort
View
112
Voted
CORR
2010
Springer
162views Education» more  CORR 2010»
15 years 2 months ago
Power Allocation Games in Wireless Networks of Multi-antenna Terminals
We consider wireless networks that can be modeled by multiple access channels in which all the terminals are equipped with multiple antennas. The propagation model used to account...
Elena Veronica Belmega, Samson Lasaulce, Mé...
108
Voted
CODES
2006
IEEE
15 years 8 months ago
Automatic run-time extraction of communication graphs from multithreaded applications
Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threa...
Ai-Hsin Liu, Robert P. Dick
FAST
2010
15 years 4 months ago
Understanding Latent Sector Errors and How to Protect Against Them
Latent sector errors (LSEs) refer to the situation where particular sectors on a drive become inaccessible. LSEs are a critical factor in data reliability, since a single LSE can ...
Bianca Schroeder, Sotirios Damouras, Phillipa Gill
AAAI
2006
15 years 3 months ago
Decision Making in Uncertain Real-World Domains Using DT-Golog
DTGolog, a decision-theoretic agent programming language based on the situation calculus, was proposed to ease some of the computational difficulties associated with Markov Decisi...
Mikhail Soutchanski, Huy Pham, John Mylopoulos
107
Voted
INFOCOM
2008
IEEE
15 years 8 months ago
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks
—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Josep...