Sciweavers

22193 search results - page 4358 / 4439
» Multiple Restricted Multiplication
Sort
View
PIMRC
2010
IEEE
14 years 9 months ago
Power control versus multiuser detection based cross-layer design in wireless ad hoc networks
Abstract--In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a c...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
PIMRC
2010
IEEE
14 years 9 months ago
Automatically configured, optimised and QoS aware wireless mesh networks
Wireless mesh networks (WMNs) are comprised of nodes with multiple radio interfaces and provide broadband residential internet access or connectivity to temporal events. Our goal i...
Elias Z. Tragos, Raffaele Bruno, Emilio Ancillotti...
PKDD
2010
Springer
178views Data Mining» more  PKDD 2010»
14 years 9 months ago
Graph Regularized Transductive Classification on Heterogeneous Information Networks
A heterogeneous information network is a network composed of multiple types of objects and links. Recently, it has been recognized that strongly-typed heterogeneous information net...
Ming Ji, Yizhou Sun, Marina Danilevsky, Jiawei Han...
PPSN
2010
Springer
14 years 9 months ago
Defining and Optimizing Indicator-Based Diversity Measures in Multiobjective Search
Abstract. In this paper, we elaborate how decision space diversity can be integrated into indicator-based multiobjective search. We introduce DIOP, the diversity integrating multio...
Tamara Ulrich, Johannes Bader, Lothar Thiele
SCN
2010
Springer
232views Communications» more  SCN 2010»
14 years 9 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
« Prev « First page 4358 / 4439 Last » Next »