Sciweavers

666 search results - page 75 / 134
» Power analysis of embedded operating systems
Sort
View
BMCBI
2007
181views more  BMCBI 2007»
15 years 4 months ago
ASMPKS: an analysis system for modular polyketide synthases
Background: Polyketides are secondary metabolites of microorganisms with diverse biological activities, including pharmacological functions such as antibiotic, antitumor and agroc...
Hongseok Tae, Eun-Bae Kong, Kiejung Park
CORR
2010
Springer
127views Education» more  CORR 2010»
15 years 4 months ago
Finite-SNR Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems
Abstract--Diversity-multiplexing tradeoff (DMT) was characterized asymptotically (SNR-> infinity) for i.i.d. Rayleigh fading channel by Zheng and Tse [1]. The SNR-asymptotic DMT...
Sergey Loyka, George Levin
JSAC
2008
151views more  JSAC 2008»
15 years 4 months ago
Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks
A cognitive radio (CR) network is often described as a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multi...
Lan Zhang, Ying-Chang Liang, Yan Xin
175
Voted
DSN
2000
IEEE
15 years 8 months ago
DEEM: A Tool for the Dependability Modeling and Evaluation of Multiple Phased Systems
Multiple-Phased Systems, whose operational life can be partitioned in a set of disjoint periods, called “phases”, include several classes of systems such as Phased Mission Sys...
Andrea Bondavalli, Ivan Mura, Silvano Chiaradonna,...
IFIP
2007
Springer
15 years 10 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...