Sciweavers

1139 search results - page 180 / 228
» Bounded Ideation Theory
Sort
View
CJ
2006
123views more  CJ 2006»
13 years 7 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
COMCOM
2006
134views more  COMCOM 2006»
13 years 7 months ago
On the deployment of VoIP in Ethernet networks: methodology and case study
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step method...
Khaled Salah
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 7 months ago
Asymptotically Optimal Multiple-access Communication via Distributed Rate Splitting
We consider the multiple-access communication problem in a distributed setting for both the additive white Gaussian noise channel and the discrete memoryless channel. We propose a ...
Jian Cao, Edmund M. Yeh
IJAR
2008
143views more  IJAR 2008»
13 years 7 months ago
A characterization of interval-valued residuated lattices
As is well-known, residuated lattices (RLs) on the unit interval correspond to leftcontinuous t-norms. Thus far, a similar characterization has not been found for RLs on the set o...
Bart Van Gasse, Chris Cornelis, Glad Deschrijver, ...
ETT
2006
88views Education» more  ETT 2006»
13 years 7 months ago
On the outage behaviour of large DS-CDMA systems with LMMSE detection
Abstract-- The outage behaviour of the single cell DSCDMA uplink is investigated for flat Rayleigh fading channels. Goal of the work is to find an analytical way for the optimisati...
Oliver Prätor, Gerhard Fettweis