Sciweavers

3 search results - page 1 / 1
» Question Answer TARA: A Terrorism Activity Resource Applicat...
Sort
View
65
Voted
ISI
2005
Springer
15 years 3 months ago
Question Answer TARA: A Terrorism Activity Resource Application
Robert P. Schumaker, Hsinchun Chen
INFOCOM
2008
IEEE
15 years 4 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...
ACSAC
2009
IEEE
15 years 4 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson