Computational Science and Its Applications: ICCSA ..., International Conference : Proceedings, 3. daļaSpringer, 2003 |
No grāmatas satura
1.–3. rezultāts no 77.
112. lappuse
... proposed scheme . In the range of 1.125 ~ 1.5 of the normalized bandwidth requirement , the proposed system reduces up to 5.8 dB in bandwidth requirement . The proposed system has a large minimum value of 0.5s ( t ) and a large squared ...
... proposed scheme . In the range of 1.125 ~ 1.5 of the normalized bandwidth requirement , the proposed system reduces up to 5.8 dB in bandwidth requirement . The proposed system has a large minimum value of 0.5s ( t ) and a large squared ...
142. lappuse
... proposed scheme performed actively to the report history . Therefore , Fig . 6 and Fig . 7 show the sensing coverage ... proposed scheme with pure probabilistic approach at the 2nd report period . Fig . 6 shows the ratio of the covered ...
... proposed scheme performed actively to the report history . Therefore , Fig . 6 and Fig . 7 show the sensing coverage ... proposed scheme with pure probabilistic approach at the 2nd report period . Fig . 6 shows the ratio of the covered ...
1177. lappuse
... proposed and the LMedS algorithms Outlier Inlier 1 Outlier1 inlier Inlier1 / ( Outlier1 + Inlier1 ) Estimation 0.6 LMedS 31 2 0.92 Good Proposed 52 2 0.96 Good 0.8 LMedS 18 3 0.82 Good Proposed 51 1 0.97 Good 1.0 LMedS 14 8 0.64 Middle ...
... proposed and the LMedS algorithms Outlier Inlier 1 Outlier1 inlier Inlier1 / ( Outlier1 + Inlier1 ) Estimation 0.6 LMedS 31 2 0.92 Good Proposed 52 2 0.96 Good 0.8 LMedS 18 3 0.82 Good Proposed 51 1 0.97 Good 1.0 LMedS 14 8 0.64 Middle ...
Saturs
A Security Requirement Management Database Based on ISOIEC | 1 |
CTOBIBased Pitch Accent Prediction Using MaximumEntropy | 21 |
PGNIDSPatternGraph Based Network Intrusion Detection System | 38 |
Autortiesības | |
73 citas sadaļas nav parādītas.
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
adversary algorithm analysis AODV applied architecture attack authentication Berlin Heidelberg 2006 blind signatures block block cipher buffer cipher cluster head collision resistant component Computer constraints cost defined detection efficient encryption evaluation fuzzy Gavrilova Genetic Algorithm hash function heuristic ICCSA IEEE implementation input integrated inventory IP address IPv4 IPv6 keystream Korea layer linear LNCS machine method minimize mobile module neural network node NP-hard objective ontology operation optimal solution output packet paper parameter password pattern performance pitch accent problem production proposed protocol provably secure public key random Research RFID router routing Section selected sensor sequence server setup signature scheme simulation skip lists solve Springer-Verlag Berlin Heidelberg Step stream cipher subnet Table tabu search technique Theorem traffic variables vector weight wireless