Sciweavers

23004 search results - page 4429 / 4601
» Evaluation of Adaptive Systems
Sort
View
98
Voted
TOPLAS
2008
138views more  TOPLAS 2008»
14 years 10 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
96
Voted
TPDS
2008
116views more  TPDS 2008»
14 years 10 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
94
Voted
JNW
2007
88views more  JNW 2007»
14 years 10 months ago
Resource Allocation Schemes in Integrated Heterogeneous Wireless and Mobile Networks
— Wireless and mobile networks have experienced a great success in the past few years. However, any single type of wireless and mobile network cannot meet all types of service re...
Wei Shen, Qing-An Zeng
TSP
2008
109views more  TSP 2008»
14 years 10 months ago
Constrained Tensor Modeling Approach to Blind Multiple-Antenna CDMA Schemes
In this paper, we consider an uplink multiple-antenna Code-Division Multiple-Access (CDMA) system linking several multiple-antenna mobile users to one multiple-antenna base-statio...
André L. F. de Almeida, Gérard Favie...
TWC
2008
116views more  TWC 2008»
14 years 10 months ago
The performance of multi-user cooperative diversity in an asynchronous CDMA uplink
Abstract--This paper investigates the impact of interuser non-orthogonality and asynchronous communication on the information-outage probability performance of multi-user decode-an...
Kanchan G. Vardhe, Daryl Reynolds, Matthew C. Vale...
« Prev « First page 4429 / 4601 Last » Next »