Sciweavers

9186 search results - page 1599 / 1838
» A Module System for Scheme
Sort
View
CN
2008
84views more  CN 2008»
15 years 3 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 3 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
JSAC
2008
98views more  JSAC 2008»
15 years 3 months ago
Multiuser Detection of Sparsely Spread CDMA
Code-division multiple access (CDMA) is the basis of a family of advanced air interfaces in current and future generation networks. The benefits promised by CDMA have not been full...
Dongning Guo, Chih-Chun Wang
ETT
2007
90views Education» more  ETT 2007»
15 years 3 months ago
Algorithms and applications of channel impulse response length estimation for MIMO-OFDM
Abstract— The performance of the widely applied timedomain channel estimation for SISO- and MIMO-OFDM systems strongly depends on the preciseness of information regarding maximum...
Marco Krondorf, Ting-Jung Liang, M. Goblirsch, Ger...
PE
2008
Springer
167views Optimization» more  PE 2008»
15 years 3 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi
« Prev « First page 1599 / 1838 Last » Next »