Sciweavers

175 search results - page 26 / 35
» A simpler and better design of error estimating coding
Sort
View
MOBICOM
2003
ACM
15 years 2 months ago
Throughput capacity of random ad hoc networks with infrastructure support
In this paper, we consider the transport capacity of ad hoc networks with a random flat topology under the present support of an infinite capacity infrastructure network. Such a...
Ulas C. Kozat, Leandros Tassiulas
78
Voted
DAC
2005
ACM
15 years 10 months ago
Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions
While performance specifications are verified before sign-off for a modern nanometer scale design, extensive application of optical proximity correction substantially alters the l...
Puneet Gupta, Andrew B. Kahng, Youngmin Kim, Denni...
95
Voted
SODA
2000
ACM
123views Algorithms» more  SODA 2000»
14 years 11 months ago
Communication complexity of document exchange
We address the problem of minimizing the communication involved in the exchange of similar documents. We consider two users, A and B, who hold documents x and y respectively. Neit...
Graham Cormode, Mike Paterson, Süleyman Cenk ...
ICC
2008
IEEE
197views Communications» more  ICC 2008»
15 years 4 months ago
V-BLAST Receiver and Performance In MIMO Relay Networks with Imperfect CSI
Abstract —Previous work demonstrated that the improvements in spectral efficiency and link reliability can be obtained in wireless relay networks employing terminals with MIMO c...
Jiansong Chen, Xiaoli Yu, C. C. Jay Kuo
IWSEC
2009
Springer
15 years 4 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...