Sciweavers

8413 search results - page 1561 / 1683
» Ordering Problem Subgoals
Sort
View
120
Voted
SCAM
2008
IEEE
15 years 10 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
140
Voted
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 10 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
136
Voted
VTC
2008
IEEE
125views Communications» more  VTC 2008»
15 years 10 months ago
A General Formula for Log-MGF Computation: Application to the Approximation of Log-Normal Power Sum via Pearson Type IV Distribu
Abstract— In [1], we have recently proposed a general approach for approximating the power sum of Log–Normal Random Variables (RVs) by using the Pearson system of distributions...
Marco Di Renzo, Fabio Graziosi, Fortunato Santucci
141
Voted
VTC
2008
IEEE
236views Communications» more  VTC 2008»
15 years 10 months ago
Apriori-LLR-Threshold-Assisted K-Best Sphere Detection for MIMO Channels
—When the maximum number of best candidates retained at each tree search level of the K-Best Sphere Detection (SD) is kept low for the sake of maintaining a low memory requiremen...
Li Wang, Lei Xu, Sheng Chen, Lajos Hanzo
131
Voted
AINA
2007
IEEE
15 years 10 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
« Prev « First page 1561 / 1683 Last » Next »