Sciweavers

6279 search results - page 1133 / 1256
» Studies in Solution Sampling
Sort
View
EIS
2011
290views ECommerce» more  EIS 2011»
14 years 5 months ago
Code query by example
Most software engineering techniques that deal with software products customization are based on anticipation: The software designer has to foresee, somehow, the future needs for ...
Sebastien Vaucouleur
JNCA
2011
137views more  JNCA 2011»
14 years 5 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
PPNA
2011
14 years 5 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
SIAMAM
2011
14 years 5 months ago
Wave Attenuation through Multiple Rows of Scatterers with Differing Periodicities
A solution method is proposed for calculating wave scattering by a multiple-row array in which the rows are permitted to have different periodicities. Each individual row contains ...
Luke G. Bennetts
TDSC
2011
14 years 5 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
« Prev « First page 1133 / 1256 Last » Next »