Sciweavers

2978 search results - page 538 / 596
» Operations Research
Sort
View
VTC
2006
IEEE
100views Communications» more  VTC 2006»
15 years 5 months ago
Initial and Post-Initial Acquisition in the Serial Search Based Noncoherent Multiple Transmit/Receive Antenna Aided DS-CDMA Down
— In this paper we investigate the issues of both initial and post-initial acquisition schemes in the multiple transmit/receive antenna aided DS-CDMA downlink, when communicating...
Seung Hwan Won, Lajos Hanzo
VTC
2006
IEEE
199views Communications» more  VTC 2006»
15 years 5 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
ACISP
2006
Springer
15 years 5 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
ACMSE
2006
ACM
15 years 5 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ANCS
2006
ACM
15 years 5 months ago
CAMP: fast and efficient IP lookup architecture
A large body of research literature has focused on improving the performance of longest prefix match IP-lookup. More recently, embedded memory based architectures have been propos...
Sailesh Kumar, Michela Becchi, Patrick Crowley, Jo...