Sciweavers

2555 search results - page 438 / 511
» Quantifiers and Working Memory
Sort
View

Publication
145views
14 years 6 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
CVPR
2011
IEEE
14 years 6 months ago
Simulating Human Saccadic Scanpaths on Natural Images
Human saccade is a dynamic process of information pursuit. Based on the principle of information maximization, we propose a computational model to simulate human saccadic scanpath...
Wei Wang, Cheng Chen, Yizhou Wang, Tingting Jiang,...
ALGORITHMICA
2011
14 years 5 months ago
Knowledge State Algorithms
We introduce the concept of knowledge states; many well-known algorithms can be viewed as knowledge state algorithms. The knowledge state approach can be used to to construct comp...
Wolfgang W. Bein, Lawrence L. Larmore, John Noga, ...
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 5 months ago
Business Intelligence for Small and Middle-Sized Entreprises
Data warehouses are the core of decision support systems, which nowadays are used by all kind of enterprises in the entire world. Although many studies have been conducted on the ...
Oksana Grabova, Jérôme Darmont, Jean-...
CORR
2011
Springer
181views Education» more  CORR 2011»
14 years 5 months ago
Study of Throughput and Delay in Finite-Buffer Line Networks
—In this work, we study the effects of finite buffers on the throughput and delay of line networks with erasure links. We identify the calculation of performance parameters such...
Badri N. Vellambi, Nima Torabkhani, Faramarz Fekri