Sciweavers

23630 search results - page 4627 / 4726
» Common Information Model
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 4 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
VTC
2007
IEEE
105views Communications» more  VTC 2007»
15 years 4 months ago
Random Beamforming OFDMA for Future Generation Cellular Communication Systems
—This paper presents a downlink performance analysis of a Layered Random Beamforming (LRB) - MIMO-OFDMA Physical Layer (PHY) as applicable to future generation wireless communica...
Congzheng Han, Angela Doufexi, Simon Armour, Joe M...
ADHOCNOW
2007
Springer
15 years 4 months ago
Topology Control and Geographic Routing in Realistic Wireless Networks
We present a distributed topology control protocol that runs on a d-QUDG for d ≥ 1/ √ 2, and computes a sparse, constant-spanner, both in Euclidean distance and in hop distance...
Kevin M. Lillis, Sriram V. Pemmaraju, Imran A. Pir...
ATAL
2007
Springer
15 years 4 months ago
Bidding optimally in concurrent second-price auctions of perfectly substitutable goods
We derive optimal bidding strategies for a global bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We first consider a mo...
Enrico H. Gerding, Rajdeep K. Dash, David C. K. Yu...
AUSAI
2007
Springer
15 years 4 months ago
Merging Algorithm to Reduce Dimensionality in Application to Web-Mining
Dimensional reduction may be effective in order to compress data without loss of essential information. Also, it may be useful in order to smooth data and reduce random noise. The...
Vladimir Nikulin, Geoffrey J. McLachlan
« Prev « First page 4627 / 4726 Last » Next »