Sciweavers

666 search results - page 75 / 134
» Power analysis of embedded operating systems
Sort
View
BMCBI
2007
181views more  BMCBI 2007»
14 years 10 months ago
ASMPKS: an analysis system for modular polyketide synthases
Background: Polyketides are secondary metabolites of microorganisms with diverse biological activities, including pharmacological functions such as antibiotic, antitumor and agroc...
Hongseok Tae, Eun-Bae Kong, Kiejung Park
CORR
2010
Springer
127views Education» more  CORR 2010»
14 years 10 months ago
Finite-SNR Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems
Abstract--Diversity-multiplexing tradeoff (DMT) was characterized asymptotically (SNR-> infinity) for i.i.d. Rayleigh fading channel by Zheng and Tse [1]. The SNR-asymptotic DMT...
Sergey Loyka, George Levin
JSAC
2008
151views more  JSAC 2008»
14 years 9 months ago
Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks
A cognitive radio (CR) network is often described as a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multi...
Lan Zhang, Ying-Chang Liang, Yan Xin
DSN
2000
IEEE
15 years 2 months ago
DEEM: A Tool for the Dependability Modeling and Evaluation of Multiple Phased Systems
Multiple-Phased Systems, whose operational life can be partitioned in a set of disjoint periods, called “phases”, include several classes of systems such as Phased Mission Sys...
Andrea Bondavalli, Ivan Mura, Silvano Chiaradonna,...
IFIP
2007
Springer
15 years 4 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...