Sciweavers

4000 search results - page 604 / 800
» Simulation down under
Sort
View
JCSS
2008
159views more  JCSS 2008»
15 years 5 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
CORR
2007
Springer
75views Education» more  CORR 2007»
15 years 5 months ago
Wavelet Based Semi-blind Channel Estimation For Multiband OFDM
— This paper introduces an expectation-maximization (EM) algorithm within a wavelet domain Bayesian framework for semi-blind channel estimation of multiband OFDM based UWB commun...
Sajad Sadough, Mahieddine Ichir, Emmanuel Jaffrot,...
JDCTA
2008
110views more  JDCTA 2008»
15 years 5 months ago
Development and Validation of a New Method for Noninvasive Diagnosis of LUTS
Lower urinary tract symptoms (LUTS) affect selfassessed quality of life. The aim of this study is to acquire useful information of LUTS diagnosis thorough uroflow and urophonograp...
Do-Un Jeong, Wan-Young Chung
CORR
2007
Springer
134views Education» more  CORR 2007»
15 years 5 months ago
An Analytical Study of a Structured Overlay in the presence of Dynamic Membership
— In this paper, we present a complete analytical study of dynamic membership (aka churn) in structured peer-to-peer networks. We use a master-equation-based approach, which is u...
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurel...
CORR
2007
Springer
119views Education» more  CORR 2007»
15 years 5 months ago
Distributed Source Coding in the Presence of Byzantine Sensors
—The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a m...
Oliver Kosut, Lang Tong