Sciweavers

9380 search results - page 1774 / 1876
» Collaborative information system design
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 1 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
JDCTA
2010
143views more  JDCTA 2010»
14 years 11 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
164
Voted
SAC
2010
ACM
14 years 11 months ago
Convex onion peeling genetic algorithm: an efficient solution to map labeling of point-feature
Map labeling of point-feature is the problem of placing text labels to corresponding point features on a map in a way that minimizes overlaps while satisfying basic rules for the ...
Wan D. Bae, Shayma Alkobaisi, Petr Vojtechovsk&yac...
TWC
2010
14 years 11 months ago
Distributed Multicell-MISO Precoding Using the Layered Virtual SINR Framework
In this letter, we address the problem of distributed multi-antenna cooperative transmission in a cellular system. Most research in this area has so far assumed that base stations ...
Randa Zakhour, David Gesbert
181
Voted
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 8 months ago
Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks
The tremendous capacity gains promised by space division multiple access (SDMA) depend critically on the accuracy of the transmit channel state information. In the broadcast chann...
Marios Kountouris, Jeffrey G. Andrews
« Prev « First page 1774 / 1876 Last » Next »