Sciweavers

3113 search results - page 486 / 623
» Efficiently Generating Efficient Generating Extensions in Pr...
Sort
View
CORR
2006
Springer
92views Education» more  CORR 2006»
14 years 10 months ago
Performance of STBC MC-CDMA systems over outdoor realistic MIMO channels
This paper deals with orthogonal Space-Time Block Coded MC-CDMA systems, in outdoor realistic downlink scenarios with up to two transmit and receive antennas. Assuming no channel s...
Fabrice Portier, Jean-Yves Baudais, Jean-Fran&cced...
IJACT
2008
83views more  IJACT 2008»
14 years 10 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
FGCS
2006
135views more  FGCS 2006»
14 years 10 months ago
Scaling applications to massively parallel machines using Projections performance analysis tool
Some of the most challenging applications to parallelize scalably are the ones that present a relatively small amount of computation per iteration. Multiple interacting performanc...
Laxmikant V. Kalé, Gengbin Zheng, Chee Wai ...
IJISTA
2008
139views more  IJISTA 2008»
14 years 10 months ago
Spherical light field rendering in application for analysis by synthesis
Abstract: This paper presents a novel approach for object classification and pose estimation which employs spherical light field rendering to generate virtual views based on synthe...
Severin Todt, Matthias Langer, Christof Rezk-Salam...
IJSN
2008
80views more  IJSN 2008»
14 years 10 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah