Sciweavers

436 search results - page 42 / 88
» Arguing for gaining access to information
Sort
View
VTC
2008
IEEE
142views Communications» more  VTC 2008»
15 years 8 months ago
EXIT-Chart Aided Hybrid Multiuser Detector Design for Frequency-Domain-Spread Chip-Interleaved MC-CDMA
— With the advent of EXtrinsic Information Transfer (EXIT) charts, we are capable of analyzing, predicting and visually comparing the convergence behaviours of different turbo Mu...
Lei Xu, Rong Zhang, Sheng Chen, Lajos Hanzo
IQIS
2004
ACM
15 years 7 months ago
Utility-based Resolution of Data Inconsistencies
A virtual database system is software that provides unified access to multiple information sources. If the sources are overlapping in their contents and independently maintained,...
Amihai Motro, Philipp Anokhin, Aybar C. Acar
MODELLIERUNG
2008
15 years 3 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
TWC
2008
142views more  TWC 2008»
15 years 1 months ago
Robust Ultra-Wideband Signal Acquisition
Ultra-wideband (UWB) communication is envisaged to be deployed in indoor environments, where the noise distribution is decidedly non-Gaussian. A critical challenge for impulse radi...
Ersen Ekrem, Mutlu Koca, Hakan Deliç
105
Voted
SIGCSE
2009
ACM
119views Education» more  SIGCSE 2009»
16 years 2 months ago
The summer academy for advancing deaf and hard of hearing in computing
Deaf and hard of hearing students are an underrepresented group in computing and face extra challenges in university-level computing courses. This paper describes a 9-week Summer ...
Anna Cavender, Richard E. Ladner, Robert I. Roth