Sciweavers

8060 search results - page 1455 / 1612
» Adaptive BICM-OFDM Systems
Sort
View
145
Voted
IEE
2008
108views more  IEE 2008»
15 years 4 months ago
Mining execution relations for crosscutting concerns
Aspect mining tries to identify crosscutting concerns in the code of existing systems and thus supports their adaption to an aspect-oriented design. A semi-automatic static aspect...
Jens Krinke
CORR
2006
Springer
126views Education» more  CORR 2006»
15 years 4 months ago
Power Control for User Cooperation
For a fading Gaussian multiple access channel with user cooperation, we obtain the optimal power allocation policies that maximize the rates achievable by block Markov superpositi...
Onur Kaya, Sennur Ulukus
CORR
2006
Springer
182views Education» more  CORR 2006»
15 years 4 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal
242
Voted
ENTCS
2006
146views more  ENTCS 2006»
15 years 4 months ago
Formalizing WSBPEL Business Processes Using Process Algebra
Industry standards for Web Service composition, such as WSBPEL, provide the notation and additional control mechanisms for the execution of business processes in Web Service colla...
Javier Cámara, Carlos Canal, Javier Cubo, A...
IJBC
2008
88views more  IJBC 2008»
15 years 4 months ago
Characterizing the Structural Quality of General Complex Software Networks
nodes and their interactions are abstract edges. This paper attempts to characterize the structural quality of complex software networks. We propose to use a novel statistical meas...
Jing Liu, Jinhu Lu, Keqing He, Bing Li, Chi Kong T...
« Prev « First page 1455 / 1612 Last » Next »