Sciweavers

1809 search results - page 101 / 362
» Using GDE in Educational Systems
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 10 months ago
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Joseph Blomer, Nihar Jindal
CORR
2007
Springer
116views Education» more  CORR 2007»
14 years 10 months ago
Rate Bounds for MIMO Relay Channels Using Message Splitting
This paper considers the multi-input multi-output (MIMO) relay channel where multiple antennas are employed by each terminal. Compared to single-input singleoutput (SISO) relay ch...
Caleb K. Lo, Sriram Vishwanath, Robert W. Heath Jr...
CORR
2010
Springer
149views Education» more  CORR 2010»
14 years 10 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CORR
2010
Springer
153views Education» more  CORR 2010»
14 years 10 months ago
Towards Parameterized Regular Type Inference Using Set Constraints
We propose a method for inferring parameterized regular types for logic programs as solutions for systems of constraints over sets of finite ground Herbrand terms (set constraint s...
Francisco Bueno, Jorge A. Navas, Manuel V. Hermene...
CORR
2008
Springer
91views Education» more  CORR 2008»
14 years 10 months ago
Outage behavior of slow fading channels with power control using noisy quantized CSIT
The topic of this study is the outage behavior of multiple-antenna slow fading channels with quantized feedback and partial power control. A fixed-rate communication system is con...
Siavash Ekbatani, Farzad Etemadi, Hamid Jafarkhani