Sciweavers

1723 search results - page 267 / 345
» Generalized file system dependencies
Sort
View
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 4 months ago
Optimum TCM Codes Design for Gaussian Channels by Considering Both Euclidean and Hamming Distances
—Trellis-coded modulation (TCM) is an attractive coded modulation technique which yields significant coding gain without bandwidth expansion. So far, researches concerning the o...
Xiao-Xin Zhang, Yuping Zhao, Li Zou
INFOCOM
2009
IEEE
15 years 4 months ago
Minimizing Average Finish Time in P2P Networks
—Peer-to-peer (P2P) file distribution is a scalable way to disseminate content to a wide audience. For a P2P network, one fundamental performance metric is the average time need...
G. Matthew Ezovski, Ao Tang, Lachlan L. H. Andrew
ICCCN
2008
IEEE
15 years 4 months ago
Fingerprint-Based Location Estimation with Virtual Access Points
— Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an ...
A. K. M. Mahtab Hossain, Hien Nguyen Van, Wee-Seng...
PDP
2008
IEEE
15 years 4 months ago
Scheduling of QR Factorization Algorithms on SMP and Multi-Core Architectures
This paper examines the scalable parallel implementation of QR factorization of a general matrix, targeting SMP and multi-core architectures. Two implementations of algorithms-by-...
Gregorio Quintana-Ortí, Enrique S. Quintana...
PIMRC
2008
IEEE
15 years 4 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz