Sciweavers

7918 search results - page 1423 / 1584
» Model Composition Directives
Sort
View
PIMRC
2010
IEEE
15 years 1 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
138
Voted
SECRYPT
2010
214views Business» more  SECRYPT 2010»
15 years 1 months ago
Nanonetworks - A New Frontier in Communications
Nanotechnology is enabling the development of devices in a scale ranging from one to a few one hundred nanometers. Nanonetworks, i.e., the interconnection of nano-scale devices, a...
Ian F. Akyildiz
124
Voted
UM
2010
Springer
15 years 1 months ago
Inducing Effective Pedagogical Strategies Using Learning Context Features
Effective pedagogical strategies are important for e-learning environments. While it is assumed that an effective learning environment should craft and adapt its actions to the use...
Min Chi, Kurt VanLehn, Diane J. Litman, Pamela W. ...
AND
2009
15 years 1 months ago
Edge noise in document images
A degradation model that describes many image degradations produced by desktop scanning is used to study the edge noise that is present in bilevel document images. The standard de...
Craig McGillivary, Chris Hale, Elisa H. Barney Smi...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 1 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
« Prev « First page 1423 / 1584 Last » Next »