Sciweavers

7080 search results - page 1322 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
CACM
2005
74views more  CACM 2005»
14 years 11 months ago
Separate handles from names on the internet
Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. ...
Michael J. O'Donnell
TMC
2010
137views more  TMC 2010»
14 years 9 months ago
Asymptotic Distortion Performance of Source-Channel Diversity over Multihop and Relay Channels
—A key challenge in the design of real-time wireless multimedia systems is the presence of fading coupled with strict delay constraints. A very effective answer to this problem i...
Karim G. Seddik, Andres Kwasinski, K. J. Ray Liu
CHI
2011
ACM
14 years 2 months ago
Twitinfo: aggregating and visualizing microblogs for event exploration
Microblogs are a tremendous repository of user-generated content about world events. However, for people trying to understand events by querying services like Twitter, a chronolog...
Adam Marcus 0002, Michael S. Bernstein, Osama Bada...
VTC
2006
IEEE
154views Communications» more  VTC 2006»
15 years 5 months ago
Adaptive Modulation and Coding for Bit Interleaved Coded Multiple Beamforming
— Bit interleaved coded multiple beamforming (BICMB) was previously designed to achieve full spatial multiplexing of min(N, M) and full spatial diversity of NM for N transmit and...
Ersin Sengul, Enis Akay, Ender Ayanoglu
ACSAC
2009
IEEE
15 years 6 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
« Prev « First page 1322 / 1416 Last » Next »