Sciweavers

3134 search results - page 222 / 627
» simulation 2010
Sort
View
PERCOM
2010
ACM
15 years 3 months ago
A visual, open-ended approach to prototyping ubiquitous computing applications
By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
Zoé Drey, Charles Consel
PIMRC
2010
IEEE
15 years 3 months ago
A multi-threshold scheme for feedback load reduction in multiuser MIMO broadcast channel
In a multiuser system, independent time-varying channels among different users can be exploited to provide multiuser diversity (MUD) gain and increase the system throughput. For th...
Jin-Hao Li, Hsuan-Jung Su, Yu-Lun Tsai
RAID
2010
Springer
15 years 3 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
SECON
2010
IEEE
15 years 3 months ago
Leveraging Cognitive Radios for Effective Communications over Water
Wireless communications over water may suffer from serious multipath fading due to strong specular reflections from conducting water surfaces. Cognitive radios enable dynamic spect...
Jian Tang, Li Zhang, Richard S. Wolff, Weiyi Zhang
VTC
2010
IEEE
132views Communications» more  VTC 2010»
15 years 3 months ago
Throughput Analysis of General Network Coding Nodes Based on SW-ARQ Transmission
The steady-state throughput of general network coding node is investigated, when data is transmitted in packets based on the stopand-wait automatic repeat request (SW-ARQ) error-co...
Yang Qin, Lie-Liang Yang