Sciweavers

2068 search results - page 270 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
IJNSEC
2008
190views more  IJNSEC 2008»
15 years 5 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
117
Voted
JCM
2008
73views more  JCM 2008»
15 years 4 months ago
Man-Made Noise Evaluation for Cryogenic Receiver Front-End
Abstract--This paper presents measured results of manmade noise impact on an cryogenic receiver front-end (CRFE) in urban and suburban areas in the 2-GHz band with amplitude probab...
Shoichi Narahashi, Kei Satoh, Yasunori Suzuki, Tet...
160
Voted
JMLR
2006
105views more  JMLR 2006»
15 years 4 months ago
Parallel Software for Training Large Scale Support Vector Machines on Multiprocessor Systems
Parallel software for solving the quadratic program arising in training support vector machines for classification problems is introduced. The software implements an iterative dec...
Luca Zanni, Thomas Serafini, Gaetano Zanghirati
135
Voted
JSA
2006
86views more  JSA 2006»
15 years 4 months ago
The design and utility of the ML-RSIM system simulator
Execution-driven simulation has become the primary method for evaluating architectural techniques as it facilitates rapid design space exploration without the cost of building pro...
Lambert Schaelicke, Michael Parker
JSAC
2006
94views more  JSAC 2006»
15 years 4 months ago
Multiuser transmitted reference ultra-wideband communication systems
Abstract--A conventional transmitted reference (TR) modulation scheme is an effective means to combat severe multipath distortion in an ultra-wideband (UWB) system, significantly r...
Zhengyuan Xu, Brian M. Sadler