Sciweavers

245 search results - page 7 / 49
» The Iterated Weakest Link
Sort
View
WCNC
2008
IEEE
15 years 6 months ago
Two-Stage Code Acquisition Employing Search Space Reduction and Iterative Detection in the DS-UWB Downlink
— In this paper we propose and investigate an iterative code acquisition scheme assisted by both search space reduction and iterative Massage Passing (MP), which was designed for...
Seung Hwan Won, Lajos Hanzo
ITIIS
2008
168views more  ITIIS 2008»
14 years 11 months ago
An Algorithm for Iterative Detection and Decoding MIMO-OFDM HARQ with Antenna Scheduling
In this paper, a multiple-input-multiple-output (MIMO) hybrid-automatic repeat request (HARQ) algorithm with antenna scheduling is proposed. It retransmits the packet using schedu...
KyooHyun Kim, SeungWon Kang, Manar Mohaisen, Kyung...
CIVR
2010
Springer
176views Image Analysis» more  CIVR 2010»
15 years 4 months ago
The effect of baroque music on the PassPoints graphical password
Graphical passwords have been demonstrated to be the possible alternatives to traditional alphanumeric passwords. However, they still tend to follow predictable patterns that are ...
Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang ...
79
Voted
CORR
2006
Springer
83views Education» more  CORR 2006»
14 years 11 months ago
Performance Analysis of CDMA Signature Optimization with Finite Rate Feedback
We analyze the performance of CDMA signature optimization with finite rate feedback. For a particular user, the receiver selects a signature vector from a signature codebook to avo...
Wei Dai, Youjian Liu, Brian Rider
CLUSTER
2007
IEEE
14 years 11 months ago
Meta-communications in component-based communication frameworks for grids
— Applications are faced with several network-related problems on current grids: heterogeneous networks, firewalls, NAT, private IP addresses, non-routed networks, performance p...
Alexandre Denis