Sciweavers

1297 search results - page 44 / 260
» fews 2007
Sort
View
AHSWN
2005
120views more  AHSWN 2005»
14 years 11 months ago
Low-Interference Topology Control for Wireless Ad Hoc Networks
Topology control has been well studied in wireless ad hoc networks. However, only a few topology control methods take into account the low interference as a goal of the methods. So...
Kousha Moaveninejad, Xiang-Yang Li
AHSWN
2005
171views more  AHSWN 2005»
14 years 11 months ago
Topology Control and Localization in Wireless Ad Hoc and Sensor Networks
Over the last few years, novel architectures like ad hoc and sensor networks have introduced new challenges in the way the communication infrastructure must be addressed. Unlike t...
Peter Gober, Artur Ziviani, Petia Todorova, Marcel...
AMC
2005
168views more  AMC 2005»
14 years 11 months ago
Comparison between the homotopy analysis method and homotopy perturbation method
In this paper, we show that the so-called ``homotopy perturbation method'' is only a special case of the homotopy analysis method. Both methods are in principle based on...
Shijun Liao
ANOR
2005
89views more  ANOR 2005»
14 years 11 months ago
Logic-Based Modeling and Solution of Nonlinear Discrete/Continuous Optimization Problems
This paper presents a review of advances in the mathematical programming approach to discrete/continuous optimization problems. We first present a brief review of MILP and MINLP f...
Sangbum Lee, Ignacio E. Grossmann
IS
2007
14 years 11 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini