Sciweavers

934 search results - page 99 / 187
» A theoretical analysis of the HIFF problem
Sort
View
TCOM
2010
65views more  TCOM 2010»
14 years 4 months ago
Max-matching diversity in OFDMA systems
Abstract--This paper considers the problem of optimal subcarrier allocation in OFDMA systems to achieve the minimum outage probability while guaranteeing fairness. The optimal subc...
Bo Bai, Wei Chen, Zhigang Cao, Khaled Ben Letaief
TCOS
2010
14 years 4 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
TON
2010
113views more  TON 2010»
14 years 4 months ago
Transmit Power Estimation Using Spatially Diverse Measurements Under Wireless Fading
Abstract--Received power measurements at spatially distributed monitors can be usefully exploited to deduce various characteristics of active wireless transmitters. In this paper, ...
Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho
INFOCOM
2011
IEEE
14 years 1 months ago
PVA in VANETs: Stopped cars are not silent
—In Vehicular Ad Hoc Networks (VANETs), the major communication challenge lies in very poor connectivity, which can be caused by sparse or unbalanced traffic. Deploying supporti...
Nianbo Liu, Ming Liu, Wei Lou, Guihai Chen, Jianno...
SIGMOD
2011
ACM
295views Database» more  SIGMOD 2011»
14 years 21 days ago
Attribute domain discovery for hidden web databases
Many web databases are hidden behind restrictive form-like interfaces which may or may not provide domain information for an attribute. When attribute domains are not available, d...
Xin Jin, Nan Zhang 0004, Gautam Das