Sciweavers

9186 search results - page 1320 / 1838
» A Module System for Scheme
Sort
View
VTC
2007
IEEE
129views Communications» more  VTC 2007»
15 years 11 months ago
Iterative EM Based LDPC CDMA Receiver under Time Varying Interference
1 — The authors of this paper proposed an iterative expectation-maximization (EM) channel estimation based on a low-density parity-check (LDPC) code-division multiple access rece...
Don J. Torrieri, Avinash Mathur, Amitav Mukherjee,...
VTC
2007
IEEE
15 years 11 months ago
A NETwork COding based Multicasting (NETCOM) over IEEE 802.11 Multi-hop
— In this paper, we present an analysis of various multicast schemes over IEEE 802.11 Multi-hop. Analyzing performance of wireless multicasting communication is important because...
Yong Ho Kim, Nan Sol Seo, Young Yong Kim
COMSWARE
2007
IEEE
15 years 11 months ago
Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks
—This paper deals with the topology formation schemes in the IEEE 802.11 based wireless mesh network. The recent standardization effort for specifying a wireless distribution sys...
Deepesh Man Shrestha, Young-Bae Ko
ACCV
2007
Springer
15 years 11 months ago
Fast 3-D Interpretation from Monocular Image Sequences on Large Motion Fields
Abstract. This paper proposes a fast method for dense 3-D interpretation to directly estimate a dense map of relative depth and motion from a monocular sequence of images on large ...
Jong-Sung Kim, Ki-Sang Hong
ESORICS
2007
Springer
15 years 11 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
« Prev « First page 1320 / 1838 Last » Next »