Sciweavers

18155 search results - page 3493 / 3631
» Point
Sort
View
CN
2007
168views more  CN 2007»
15 years 1 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
106
Voted
IOR
2008
126views more  IOR 2008»
15 years 1 months ago
Fast Simulation of Multifactor Portfolio Credit Risk
This paper develops rare event simulation methods for the estimation of portfolio credit risk -- the risk of losses to a portfolio resulting from defaults of assets in the portfol...
Paul Glasserman, Wanmo Kang, Perwez Shahabuddin
120
Voted
IOR
2008
91views more  IOR 2008»
15 years 1 months ago
A Randomized Quasi-Monte Carlo Simulation Method for Markov Chains
We introduce and study a randomized quasi-Monte Carlo method for estimating the state distribution at each step of a Markov chain. The number of steps in the chain can be random an...
Pierre L'Ecuyer, Christian Lécot, Bruno Tuf...
COMPUTER
2007
93views more  COMPUTER 2007»
15 years 1 months ago
The Computing Profession and Higher Education
not things, but abstractions that represent things. Data use provides human civilization’s foundation, and computers and other digital technologies have merely amplified this us...
W. Neville Holmes
130
Voted
IJNSEC
2006
134views more  IJNSEC 2006»
15 years 1 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
« Prev « First page 3493 / 3631 Last » Next »