Sciweavers

3113 search results - page 486 / 623
» Efficiently Generating Efficient Generating Extensions in Pr...
Sort
View
120
Voted
CORR
2006
Springer
92views Education» more  CORR 2006»
15 years 3 months ago
Performance of STBC MC-CDMA systems over outdoor realistic MIMO channels
This paper deals with orthogonal Space-Time Block Coded MC-CDMA systems, in outdoor realistic downlink scenarios with up to two transmit and receive antennas. Assuming no channel s...
Fabrice Portier, Jean-Yves Baudais, Jean-Fran&cced...
119
Voted
IJACT
2008
83views more  IJACT 2008»
15 years 3 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
120
Voted
FGCS
2006
135views more  FGCS 2006»
15 years 3 months ago
Scaling applications to massively parallel machines using Projections performance analysis tool
Some of the most challenging applications to parallelize scalably are the ones that present a relatively small amount of computation per iteration. Multiple interacting performanc...
Laxmikant V. Kalé, Gengbin Zheng, Chee Wai ...
128
Voted
IJISTA
2008
139views more  IJISTA 2008»
15 years 3 months ago
Spherical light field rendering in application for analysis by synthesis
Abstract: This paper presents a novel approach for object classification and pose estimation which employs spherical light field rendering to generate virtual views based on synthe...
Severin Todt, Matthias Langer, Christof Rezk-Salam...
IJSN
2008
80views more  IJSN 2008»
15 years 3 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah