Sciweavers

12289 search results - page 2196 / 2458
» computing 2006
Sort
View
114
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 4 months ago
Capacity Results for Block-Stationary Gaussian Fading Channels with a Peak Power Constraint
Abstract--A peak-power-limited single-antenna block-stationary Gaussian fading channel is studied, where neither the transmitter nor the receiver knows the channel state informatio...
Jun Chen, Venugopal V. Veeravalli
CORR
2006
Springer
77views Education» more  CORR 2006»
15 years 4 months ago
Prioritizing Software Inspection Results using Static Profiling
Static software checking tools are useful as an additional automated software inspection step that can easily be integrated in the development cycle and assist in creating secure,...
Cathal Boogerd, Leon Moonen
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 4 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
CORR
2006
Springer
140views Education» more  CORR 2006»
15 years 4 months ago
A Vortex Method for Bi-phasic Fluids Interacting with Rigid Bodies
We present an accurate Lagrangian method based on vortex particles, level-sets, and immersed boundary methods, for animating the interplay between two fluids and rigid solids. We ...
Mathieu Coquerelle, Jérémie Allard, ...
CORR
2006
Springer
154views Education» more  CORR 2006»
15 years 4 months ago
How Hard Is Bribery in Elections?
We study the complexity of influencing elections through bribery: How computationally complex is it for an external actor to determine whether by paying certain voters to change t...
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hem...
« Prev « First page 2196 / 2458 Last » Next »