Sciweavers

1801 search results - page 198 / 361
» Pointing without a pointer
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
Association Control in Mobile Wireless Networks
—As mobile nodes roam in a wireless network, they continuously associate with different access points and perform handoff operations. However, these handoffs can potentially incu...
Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy 0...
VTC
2008
IEEE
155views Communications» more  VTC 2008»
15 years 4 months ago
System Performance Analysis of Single-Path and Cooperative MIMO Relaying
— The demand for even higher data rates in future mobile communications systems calls for new techniques capable of improving the performance of cellular systems. One possibility...
Peter Rost, Fredrik Boye, Gerhard Fettweis
ACISICIS
2007
IEEE
15 years 4 months ago
Slicing Aided Design of Obfuscating Transforms
Abstract—An obfuscation aims to transform a program, without affecting its functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Anirban Majumdar, Clark D. Thombors...
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
15 years 4 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
CEC
2007
IEEE
15 years 4 months ago
Evolutionary random neural ensembles based on negative correlation learning
— This paper proposes to incorporate bootstrap of data, random feature subspace and evolutionary algorithm with negative correlation learning to automatically design accurate and...
Huanhuan Chen, Xin Yao