Sciweavers

10061 search results - page 1841 / 2013
» Statistical Models of Conditioning
Sort
View
153
Voted
SEKE
2010
Springer
15 years 1 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
140
Voted
SIAMSC
2010
144views more  SIAMSC 2010»
15 years 1 months ago
A Fully Implicit Domain Decomposition Algorithm for Shallow Water Equations on the Cubed-Sphere
Abstract. Popular approaches for solving the shallow water equations (SWE) for climate modeling are explicit and semi-implicit methods, both have certain constraints on the time st...
Chao Yang, Jianwen Cao, Xiao-Chuan Cai
97
Voted
TCOM
2010
68views more  TCOM 2010»
15 years 1 months ago
Coded multipulse pulse-position modulation for free-space optical communications
—In this letter, we address two questions concerning the application of multipulse pulse-position modulation (MPPM) for free-space optical (FSO) communications: (1) under what co...
Trung Thanh Nguyen, Lutz H.-J. Lampe
122
Voted
TELSYS
2010
122views more  TELSYS 2010»
15 years 1 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...
123
Voted
VTC
2010
IEEE
143views Communications» more  VTC 2010»
15 years 1 months ago
Partner Selection and Power Control for Asymmetrical Collaborative Networks
—We derive an adaptive power control method for a collaborative network utilizing partner selection that aims to minimize the frame error rate (FER). We model a decodeand-forward...
Weisi Guo, Ioannis Chatzigeorgiou, Ian J. Wassell,...
« Prev « First page 1841 / 2013 Last » Next »