Sciweavers

499 search results - page 82 / 100
» A Study on Latent Vulnerabilities
Sort
View
ICC
2009
IEEE
14 years 10 months ago
OFDMA-TDD Networks with Busy Burst Enabled Grid-of-Beam Selection
Abstract--Interference aware user scheduling in fixed gridof-beam (GoB) transmission is envisaged to significantly benefit from the receiver initiated busy burst (BB) protocol. Fix...
Birendra Ghimire, Gunther Auer, Harald Haas
IGARSS
2009
14 years 10 months ago
The Dynamics of Water Depletion and Global Warming
: Water is the most vital liquids on our planet which makes this study to focus on the regimes of human disturbance and the dynamics of water involving energy discharge, motion, ch...
Benjamin Uchenna Nwaneri, Abigail Lartey, Faithful...
100
Voted
CORR
2011
Springer
165views Education» more  CORR 2011»
14 years 7 months ago
The Impact of Memory Models on Software Reliability in Multiprocessors
The memory consistency model is a fundamental system property characterizing a multiprocessor. The relative merits of strict versus relaxed memory models have been widely debated ...
Alexander Jaffe, Thomas Moscibroda, Laura Effinger...
132
Voted
TMC
2011
164views more  TMC 2011»
14 years 7 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
ICASSP
2011
IEEE
14 years 4 months ago
Relevance language modeling for speech recognition
Language models for speech recognition tend to be brittle across domains, since their performance is vulnerable to changes in the genre or topic of the text on which they are trai...
Kuan-Yu Chen, Berlin Chen