Sciweavers

683 search results - page 65 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
97
Voted
PIMRC
2010
IEEE
14 years 10 months ago
Low-complexity iteration control for MIMO-BICM systems
Air bandwidth is a precious resource for wireless communication. Multiple-antenna (MIMO) systems enable an increase in channel capacity without increasing the air bandwidth. An ite...
C. Gimmler, Timo Lehnigk-Emden, Norbert Wehn
WORDS
2002
IEEE
15 years 5 months ago
Writing Temporally Predictable Code
The Worst-Case Execution-Time Analysis (WCET Analysis) of program code that is to be executed on modern processors is a highly complex task. First, it involves path analysis, to i...
Peter P. Puschner, Alan Burns
CGF
2011
14 years 4 months ago
Procedural Modeling of Interconnected Structures
The complexity and detail of geometric scenes that are used in today’s computer animated films and interactive games have reached a level where the manual creation by tradition...
Lars Krecklau, Leif Kobbelt
CASES
2005
ACM
15 years 2 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
107
Voted
ICC
2007
IEEE
172views Communications» more  ICC 2007»
15 years 7 months ago
Performance Analysis of Cooperative Diversity Using Equal Gain Combining (EGC) Technique Over Rayleigh Fading Channels
Abstract— Cooperative diversiy is a promising technology for future wireless networks. In this paper, based on the moment generating function (MGF), we derive exact closed-form e...
Salama Ikki, Mohamed H. Ahmed