Sciweavers

964 search results - page 65 / 193
» Performance Limitations of ADSL Users: A Case Study
Sort
View
IWIA
2006
IEEE
15 years 5 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
INFOCOM
2006
IEEE
15 years 5 months ago
Predictability of WLAN Mobility and Its Effects on Bandwidth Provisioning
— Wireless local area networks (WLANs) are emerging as a popular technology for access to the Internet and enterprise networks. In the long term, the success of WLANs depends on ...
Libo Song, Udayan Deshpande, Ulas C. Kozat, David ...
ICASSP
2011
IEEE
14 years 3 months ago
How much feedback overhead is required for base station cooperative transmission to outperform non-cooperative transmission?
Coherent base station (BS) cooperative transmission provides high spectrum efficiency for cellular systems when channel state information (CSI) is perfectly known at the BSs. For...
Xueying Hou, Chenyang Yang
EC
2010
133views ECommerce» more  EC 2010»
14 years 12 months ago
Interactive EC Control of Synthesized Timbre
Perhaps the biggest limitation of interactive EC is the fitness evaluation bottleneck, caused by slow user evaluation and leading to small populations and user fatigue. In this st...
James McDermott, Michael O'Neill, Niall J. L. Grif...
ICDAR
2003
IEEE
15 years 5 months ago
Individuality of Numerals
The analysis of handwritten documents from the viewpoint of determining their authorship has great bearing on the criminal justice system. In many cases, only a limited amount of ...
Sargur N. Srihari, Catalin I. Tomai, Bin Zhang, Sa...