Sciweavers

1886 search results - page 246 / 378
» Verifying and Validating Simulation Models
Sort
View

Publication
145views
14 years 6 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
PET
2012
Springer
13 years 12 days ago
Understanding Statistical Disclosure: A Least Squares Approach
It is widely accepted that Disclosure Attacks are effective against high-latency anonymous communication systems. A number of Disclosure Attack variants can be found in the litera...
Fernando Pérez-González, Carmela Tro...
FGCS
1992
103views more  FGCS 1992»
14 years 11 months ago
Parallel Inference Machine PIM
: There have been no major control problems during the first three years of the new Tokaido-Sanyo Shinkansen (bullet train) Programmed Route Control (PRC) computer system. Prior to...
Kazuo Taki
WSC
1998
14 years 11 months ago
Customer Interfacing - Lessons Learned
Customer interfacing is the process through which one works with and relates to their customer. Often in the technical world, modelers find it easier to interface with computers r...
David M. Ferrin, Richard P. Lavecchia
VLSID
2008
IEEE
128views VLSI» more  VLSID 2008»
15 years 10 months ago
Addressing the Challenges of Synchronization/Communication and Debugging Support in Hardware/Software Cosimulation
With increasing adoption of Electronic System Level (ESL) tools, effective design and validation time has reduced to a considerable extent. Cosimulation is found to be a principal...
Banit Agrawal, Timothy Sherwood, Chulho Shin, Simo...