Sciweavers

9186 search results - page 1599 / 1838
» A Module System for Scheme
Sort
View
118
Voted
CN
2008
84views more  CN 2008»
15 years 23 days ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 20 days ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
123
Voted
JSAC
2008
98views more  JSAC 2008»
15 years 19 days ago
Multiuser Detection of Sparsely Spread CDMA
Code-division multiple access (CDMA) is the basis of a family of advanced air interfaces in current and future generation networks. The benefits promised by CDMA have not been full...
Dongning Guo, Chih-Chun Wang
112
Voted
ETT
2007
90views Education» more  ETT 2007»
15 years 19 days ago
Algorithms and applications of channel impulse response length estimation for MIMO-OFDM
Abstract— The performance of the widely applied timedomain channel estimation for SISO- and MIMO-OFDM systems strongly depends on the preciseness of information regarding maximum...
Marco Krondorf, Ting-Jung Liang, M. Goblirsch, Ger...
121
Voted
PE
2008
Springer
167views Optimization» more  PE 2008»
15 years 18 days ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi
« Prev « First page 1599 / 1838 Last » Next »