Sciweavers

2137 search results - page 183 / 428
» Proving Abstract Non-interference
Sort
View
VTC
2008
IEEE
15 years 9 months ago
Finding the Best QoS Path in a Gilbert Channel Network
—Many different types of modern wired and wireless communication links can be mathematically described as discretebert channels. In this extended abstract, we present an exact me...
Edwin Soedarmadji
127
Voted
WCNC
2008
IEEE
15 years 9 months ago
Distributed Space-Frequency Coding over Amplify-and-Forward Relay Channels
Abstract— In this paper, the design of distributed spacefrequency codes (DSFCs) for wireless relay networks employing the amplify-and-forward (AAF) protocol is considered. The te...
Karim G. Seddik, K. J. Ray Liu
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 9 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
ARITH
2007
IEEE
15 years 9 months ago
Multiplication by a Constant is Sublinear
Abstract— This paper explores the use of the double-base number system (DBNS) for constant integer multiplication. The DBNS recoding scheme represents integers – in this case c...
Vassil S. Dimitrov, Laurent Imbert, Andrew Zakaluz...
103
Voted
CEC
2007
IEEE
15 years 9 months ago
Computational intelligence algorithms for risk-adjusted trading strategies
Abstract— This paper investigates the performance of trading strategies identified through Computational Intelligence techniques. We focus on trading rules derived by Genetic Pr...
Nicos G. Pavlidis, E. G. Pavlidis, Michael G. Epit...