Sciweavers

762 search results - page 146 / 153
» The Necessity of Combining Adaptation Methods
Sort
View
CISS
2007
IEEE
15 years 6 months ago
Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter
— We study the case of a single transmitter, which communicates to two co-located users, through an independent block Rayleigh fading channel. The co-location nature of the users...
Amichai Sanderovich, Avi Steiner, Shlomo Shamai
ICRA
2007
IEEE
155views Robotics» more  ICRA 2007»
15 years 6 months ago
Dogged Learning for Robots
— Ubiquitous robots need the ability to adapt their behaviour to the changing situations and demands they will encounter during their lifetimes. In particular, non-technical user...
Daniel H. Grollman, Odest Chadwicke Jenkins
PG
2007
IEEE
15 years 6 months ago
Visualisation of Implicit Algebraic Curves
We describe a new algorithm for the visualisation of implicit algebraic curves, which isolates the singular points, compute the topological degree around these points in order to ...
Lionel Alberti, Bernard Mourrain
VTC
2007
IEEE
130views Communications» more  VTC 2007»
15 years 6 months ago
Phase Noise Suppression in OFDM with Spatial Multiplexing
— A very promising way to achieve high spectral efficiency in wireless communication is the use of multiple transmit and receive antennas. However, in combination with multicarr...
Steffen Bittner, Wolfgang Rave, Gerhard Fettweis
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
15 years 5 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel