Sciweavers

517 search results - page 80 / 104
» Bit Encryption Is Complete
Sort
View
PIMRC
2010
IEEE
13 years 5 months ago
Carrier frequency synchronization in the downlink of 3GPP LTE
Abstract--In this paper, we investigate carrier frequency synchronization in the downlink of 3GPP Long Term Evolution (LTE). A complete carrier frequency offset estimation and comp...
Qi Wang, Christian Mehlführer, Markus Rupp
IPSN
2007
Springer
14 years 2 months ago
Active sensing platform for wireless structural health monitoring
This paper presents SHiMmer, a wireless platform for sensing and actuation that combines localized processing with energy harvesting to provide long-lived structural health monito...
D. Musiani, K. Lin, Tajana Simunic Rosing
NETWORKING
2008
13 years 9 months ago
Modeling Priority-Based Incentive Policies for Peer-Assisted Content Delivery Systems
Content delivery providers can improve their service scalability and offload their servers by making use of content transfers among their clients. To provide peers with incentive t...
Niklas Carlsson, Derek L. Eager
ENTCS
2008
80views more  ENTCS 2008»
13 years 8 months ago
Idempotents in Dagger Categories: (Extended Abstract)
d abstract) Peter Selinger1 Department of Mathematics and Statistics Dalhousie University, Halifax, Nova Scotia, Canada Dagger compact closed categories were studied by Abramsky a...
Peter Selinger
STOC
2007
ACM
179views Algorithms» more  STOC 2007»
14 years 8 months ago
Towards 3-query locally decodable codes of subexponential length
A q-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit xi of the message by querying only...
Sergey Yekhanin