Sciweavers

8154 search results - page 1504 / 1631
» Understanding changes in use cases: A case study
Sort
View
CORR
2010
Springer
140views Education» more  CORR 2010»
14 years 9 months ago
On Scaling Laws of Diversity Schemes in Decentralized Estimation
This paper is concerned with decentralized estimation of a Gaussian source using multiple sensors. We consider a diversity scheme where only the sensor with the best channel sends...
Alex S. Leong, Subhrakanti Dey
GLOBECOM
2010
IEEE
14 years 9 months ago
A Coalition Formation Game in Partition Form for Peer-to-Peer File Sharing Networks
In current peer-to-peer file sharing networks, a large number of peers with heterogeneous connections simultaneously seek to download resources, e.g., files or file fragments, from...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
TON
2010
163views more  TON 2010»
14 years 6 months ago
Usage Patterns in an Urban WiFi Network
While WiFi was initially designed as a local-area access network, mesh networking technologies have led to increasingly expansive deployments of WiFi networks. In urban environment...
Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelke...
TSE
2010
197views more  TSE 2010»
14 years 6 months ago
A Genetic Algorithm-Based Stress Test Requirements Generator Tool and Its Empirical Evaluation
Genetic algorithms (GAs) have been applied previously to UML-driven, stress test requirements generation with the aim of increasing chances of discovering faults relating to networ...
Vahid Garousi
WWW
2009
ACM
15 years 12 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
« Prev « First page 1504 / 1631 Last » Next »