Sciweavers

18451 search results - page 64 / 3691
» Selecting a Selection Procedure
Sort
View
WSC
2004
15 years 5 months ago
Bayesian Methods for Discrete Event Simulation
Bayesian methods are now used in a variety of ways in discrete-event simulation. Applications include input modeling, response surface modeling, uncertainty analysis, and experime...
Stephen E. Chick
ICISC
2009
138views Cryptology» more  ICISC 2009»
15 years 2 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
GLOBECOM
2006
IEEE
15 years 10 months ago
Distributed Multi-Cell Zero-Forcing Beamforming in Cellular Downlink Channels
Abstract— For a multiple-input single-output (MISO) downlink channel with ¢ transmit antennas, it has been recently proved that zero-forcing beamforming (ZFBF) to a subset of (a...
Oren Somekh, Osvaldo Simeone, Yeheskel Bar-Ness, A...
MOBICOM
2004
ACM
15 years 10 months ago
Reducing MAC layer handoff latency in IEEE 802.11 wireless LANs
With the growth of IEEE 802.11-based wireless LANs, VoIP and similar applications are now commonly used over wireless networks. Mobile station performs a handoff whenever it move...
Sangho Shin, Andrea G. Forte, Anshuman Singh Rawat...
ICMCS
2009
IEEE
130views Multimedia» more  ICMCS 2009»
15 years 2 months ago
On improving the collision property of robust hashing based on projections
In this paper, we study the collision property of one of the robust hash functions proposed in [1]. This method was originally proposed for robust hash generation from blocks of i...
Regunathan Radhakrishnan, Wenyu Jiang, Claus Bauer