Sciweavers

1151 search results - page 198 / 231
» Optimization of coded GMSK systems
Sort
View
JSAC
2008
98views more  JSAC 2008»
14 years 11 months ago
Multiuser Detection of Sparsely Spread CDMA
Code-division multiple access (CDMA) is the basis of a family of advanced air interfaces in current and future generation networks. The benefits promised by CDMA have not been full...
Dongning Guo, Chih-Chun Wang
LCTRTS
2009
Springer
15 years 5 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
PE
2002
Springer
111views Optimization» more  PE 2002»
14 years 10 months ago
Forwarders vs. centralized server: an evaluation of two approaches for locating mobile agents
This paper evaluates and compares the performance of two approaches for locating an agent in a mobile agent environment. The first approach dynamically creates a chain of forwarde...
Sara Alouf, Fabrice Huet, Philippe Nain
FECS
2010
131views Education» more  FECS 2010»
14 years 9 months ago
The Mythical Creature Approach - A Simulation Alternative to Building Computer Architectures
In this paper, we present a method to help teach computer architecture (or computer organization) by developing an in class system where the students, themselves, compile high-leve...
Peter Jamieson, Darrel Davis, Brooke Spangler
TDSC
2010
218views more  TDSC 2010»
14 years 9 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...