Sciweavers

1610 search results - page 208 / 322
» Identity Based Multisignatures
Sort
View
131
Voted
ICCAD
2001
IEEE
107views Hardware» more  ICCAD 2001»
16 years 5 days ago
A Convex Programming Approach to Positive Real Rational Approximation
As system integration evolves and tighter design constraints must be met, it becomes necessary to account for the non-ideal behavior of all the elements in a system. Certain devic...
Carlos P. Coelho, Joel R. Phillips, Luis Miguel Si...
146
Voted
EVOW
2010
Springer
15 years 10 months ago
Top-Down Induction of Phylogenetic Trees
We propose a novel distance based method for phylogenetic tree reconstruction. Our method is based on a conceptual clustering method that extends the well-known decision tree learn...
Celine Vens, Eduardo Costa, Hendrik Blockeel
DSN
2009
IEEE
15 years 10 months ago
Power supply induced common cause faults-experimental assessment of potential countermeasures
Fault-tolerant architectures based on physical replication of components are vulnerable to faults that cause the same effect in all replica. Short outages in a power supply shared...
Peter Tummeltshammer, Andreas Steininger
116
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Channel Orthogonalizing Precoder for Open-Loop QO-STBC Systems
—This paper proposes a new preprocessing scheme for rate-one quasi-orthogonal space-time block code (QO-STBC), which requires no channel state information at the transmitter. We ...
Heejin Kim, Heunchul Lee, Inkyu Lee
133
Voted
WEBI
2009
Springer
15 years 10 months ago
Revealing Hidden Community Structures and Identifying Bridges in Complex Networks: An Application to Analyzing Contents of Web P
The emergence of scale free and small world properties in real world complex networks has stimulated lots of activity in the field of network analysis. An example of such a netwo...
Faraz Zaidi, Arnaud Sallaberry, Guy Melanço...