Sciweavers

3192 search results - page 427 / 639
» Translating Model Simulators to Analysis Models
Sort
View
WMASH
2004
ACM
15 years 9 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
ANOR
2010
77views more  ANOR 2010»
15 years 4 months ago
Time-dependent analysis for refused admissions in clinical wards
For capacity planning issues in health care, such as the allocation of hospital beds, the admissions rate of patients is commonly assumed to be constant over time. In addition to ...
René Bekker, A. M. de Bruin
JCM
2006
112views more  JCM 2006»
15 years 4 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
JSAC
2006
103views more  JSAC 2006»
15 years 4 months ago
Performance analysis of M-ary PPM TH-UWB systems in the presence of MUI and timing jitter
The symbol error probability (SEP) performance of time-hopping (TH) ultra-wideband (UWB) systems in the presence of multiuser interference (MUI) and timing jitter is considered wit...
N. V. Kokkalis, P. Takis Mathiopoulos, George K. K...
PE
2006
Springer
103views Optimization» more  PE 2006»
15 years 4 months ago
The LCD interconnection of LRU caches and its analysis
In a multi-level cache such as those used for web caching, a hit at level l leads to the caching of the requested object in all intermediate caches on the reverse path (levels l -...
Nikolaos Laoutaris, Hao Che, Ioannis Stavrakakis