Sciweavers

11211 search results - page 1720 / 2243
» Rank-Sensitive Data Structures
Sort
View
VTC
2008
IEEE
185views Communications» more  VTC 2008»
15 years 11 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
ADMA
2008
Springer
147views Data Mining» more  ADMA 2008»
15 years 11 months ago
Mining Supplemental Frequent Patterns
The process of resource distribution and load balance of a distributed P2P network can be described as the process of mining Supplement Frequent Patterns (SFPs) from query transact...
Yintian Liu, Yingming Liu, Tao Zeng, Kaikuo Xu, Ro...
DATE
2007
IEEE
114views Hardware» more  DATE 2007»
15 years 11 months ago
Performance aware secure code partitioning
Many embedded applications exist where decisions are made using sensitive information. A critical issue in such applications is to ensure that data is accessed only by authorized ...
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
GLOBECOM
2007
IEEE
15 years 11 months ago
Turbo Equalization for Single Antenna Cochannel Interference Cancellation in Single Carrier Transmission Systems
Abstract—In recent years, single antenna interference cancellation (SAIC) has evolved as an attractive method to increase the capacity of single carrier mobile radio networks lik...
Patrick Nickel, Wolfgang H. Gerstacker, Wolfgang K...
IAT
2007
IEEE
15 years 11 months ago
Survey of Tools for Collaborative Knowledge Construction and Sharing
The fast growth and spread of Web 2.0 environments have demonstrated the great willingness of general Web users to contribute and share various type of content and information. Ma...
Gianluca Correndo, Harith Alani
« Prev « First page 1720 / 2243 Last » Next »