Sciweavers

336 search results - page 61 / 68
» Analytic Cut Trees
Sort
View
CORR
2006
Springer
147views Education» more  CORR 2006»
13 years 7 months ago
ARQ Diversity in Fading Random Access Channels
A cross-layer optimization approach is adopted for the design of symmetric random access wireless systems. Instead of the traditional collision model, a more realistic physical la...
Young-Han Nam, Praveen Kumar Gopala, Hesham El Gam...
CGA
2005
13 years 7 months ago
Bounded Blending for Function-Based Shape Modeling
We propose new analytical formulations of bounded blending operations for the function-based constructive shape modeling. The blending set operations are defined using R-functions...
Galina Pasko, Alexander A. Pasko, Tosiyasu L. Kuni...
TWC
2008
176views more  TWC 2008»
13 years 7 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
COMBINATORICS
2000
84views more  COMBINATORICS 2000»
13 years 7 months ago
A Note on the Asymptotic Behavior of the Heights in b-Tries for b Large
We study the limiting distribution of the height in a generalized trie in which external nodes are capable to store up to b items (the so called b-tries). We assume that such a tr...
Charles Knessl, Wojciech Szpankowski
CN
1998
81views more  CN 1998»
13 years 7 months ago
Improving the WWW: Caching or Multicast?
We consider two schemes for the distributionof Web documents. In the first scheme the sender repeatedly transmits the Web document into a multicast address, and receivers asynchr...
Pablo Rodriguez, Keith W. Ross, Ernst Biersack