Sciweavers

5234 search results - page 932 / 1047
» Simulation of Computer Network Attacks
Sort
View
CEC
2008
IEEE
15 years 10 months ago
Automatic model type selection with heterogeneous evolution: An application to RF circuit block modeling
— Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a cost effe...
Dirk Gorissen, Luciano De Tommasi, Jeroen Croon, T...
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 9 months ago
A Token-Based Scheduling Scheme for WLANs and Its Performance Analysis
— Most of the existing WLAN MAC protocols can only provide limited service differentiation. In this paper, we propose a novel token-based scheduling scheme for precise and quanti...
Ping Wang, Weihua Zhuang
ASPDAC
2006
ACM
88views Hardware» more  ASPDAC 2006»
15 years 9 months ago
Equivalent circuit modeling of guard ring structures for evaluation of substrate crosstalk isolation
— A substrate-coupling equivalent circuit can be derived for an arbitrary guard ring test structure by way of F-matrix computation. The derived netlist represents a unified impe...
Daisuke Kosaka, Makoto Nagata
LCN
2005
IEEE
15 years 9 months ago
Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation Prediction
— An analytical model is proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA provides class-b...
Paal Engelstad, Olav N. Østerbø
127
Voted
ISER
2004
Springer
115views Robotics» more  ISER 2004»
15 years 8 months ago
Dynamic Virtual Fences for Controlling Cows
A virtual fence is created by applying an aversive stimulus to an animal when it approaches a predefined boundary. It is implemented by a small animal-borne computer system with a...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...