Sciweavers

113 search results - page 14 / 23
» Tips for successful practice of simulation
Sort
View
SODA
2008
ACM
126views Algorithms» more  SODA 2008»
14 years 11 months ago
On distributing symmetric streaming computations
A common approach for dealing with large data sets is to stream over the input in one pass, and perform computations using sublinear resources. For truly massive data sets, howeve...
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropo...
DAC
2003
ACM
15 years 10 months ago
Instruction encoding synthesis for architecture exploration using hierarchical processor models
This paper presents a novel instruction encoding generation technique for use in architecture exploration for application specific processors. The underlying exploration methodolo...
Achim Nohl, Volker Greive, Gunnar Braun, Andreas H...
CCECE
2009
IEEE
15 years 4 months ago
A distributed and cooperative supervisory estimation of multi-agent systems - Part I: Framework
Abstract—In this work, we propose a framework for supervisory cooperative estimation of multi-agent linear time-invariant (LTI) systems. We introduce a group of sub-observers, ea...
Seyyedmohsen Azizi, Mani M. Tousi, Kash Khorasani
84
Voted
DSN
2009
IEEE
15 years 4 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
ICC
2009
IEEE
233views Communications» more  ICC 2009»
15 years 4 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi