Sciweavers

4466 search results - page 855 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
TIFS
2008
145views more  TIFS 2008»
14 years 11 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
TOCS
2008
107views more  TOCS 2008»
14 years 11 months ago
RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks
RaWMS is a novel lightweight random membership service for ad hoc networks. The service provides each node with a partial uniformly chosen view of network nodes. Such a membership...
Ziv Bar-Yossef, Roy Friedman, Gabriel Kliot
TWC
2008
143views more  TWC 2008»
14 years 11 months ago
Antenna combining for the MIMO downlink channel
A multiple antenna downlink channel where limited channel feedback is available to the transmitter is considered. In a vector downlink channel (single antenna at each receiver), th...
Nihar Jindal
BMCBI
2004
108views more  BMCBI 2004»
14 years 11 months ago
Improving the scaling normalization for high-density oligonucleotide GeneChip expression microarrays
Background: Normalization is an important step for microarray data analysis to minimize biological and technical variations. Choosing a suitable approach can be critical. The defa...
Chao Lu
JSS
2000
97views more  JSS 2000»
14 years 11 months ago
Exploring the relationships between design measures and software quality in object-oriented systems
The first goal of this paper is to empirically explore the relationships between existing object-oriented coupling, cohesion, and inheritance measures and the probability of fault...
Lionel C. Briand, Jürgen Wüst, John W. D...