Sciweavers

686 search results - page 85 / 138
» Statistical Timing Analysis with Extended Pseudo-Canonical T...
Sort
View
ICSE
2004
IEEE-ACM
15 years 9 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
ANSS
2002
IEEE
15 years 2 months ago
A Simulation Based Performance Analysis of a TCP Extension for Best-Effort Multimedia Applications
Since TCP is considered unsuitable for the majority of the emerging multimedia applications, these applications primarily use UDP transport together with proprietary congestion co...
Karl-Johan Grinnemo, Anna Brunstrom
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 4 months ago
Queuing with Adaptive Modulation over MIMO Wireless Links for Deadline Constrained Traffic: Cross-Layer Analysis and Design
In this paper, we consider a deadline constrained traffic and analyze the joint effects of packet queuing and adaptive modulation (AM) for packet transmission in MIMO systems. We p...
Jalil S. Harsini, Farshad Lahouti
SIBGRAPI
2009
IEEE
15 years 4 months ago
A Multi-linear Discriminant Analysis of 2D Frontal Face Images
We have designed and implemented a multi-linear discriminant method of constructing and quantifying statistically significant changes on human identity photographs. The method is...
Carlos E. Thomaz, Vagner do Amaral, Gilson Antonio...
INFOCOM
2008
IEEE
15 years 4 months ago
Competitive Analysis of Opportunistic Spectrum Access Strategies
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Nicholas B. Chang, Mingyan Liu