Sciweavers

315 search results - page 28 / 63
» Claims Analysis
Sort
View
170
Voted
IMC
2010
ACM
15 years 1 months ago
Measurement and analysis of real-world 802.11 mesh networks
Despite many years of work in wireless mesh networks built using 802.11 radios, the performance and behavior of these networks in the wild is not well-understood. This lack of und...
Katrina LaCurts, Hari Balakrishnan
172
Voted
TWC
2010
14 years 10 months ago
Distributed consensus-based demodulation: algorithms and error analysis
This paper deals with distributed demodulation of space-time transmissions of a common message from a multiantenna access point (AP) to a wireless sensor network. Based on local me...
Hao Zhu, Alfonso Cano, Georgios B. Giannakis
123
Voted
ISSTA
2009
ACM
15 years 10 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
107
Voted
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
15 years 9 months ago
Security Evaluation of Asynchronous Circuits
Abstract. Balanced asynchronous circuits have been touted as a superior replacement for conventional synchronous circuits. To assess these claims, we have designed, manufactured an...
Jacques J. A. Fournier, Simon W. Moore, Huiyun Li,...
139
Voted
HIS
2003
15 years 5 months ago
Evolving Better Stoplists for Document Clustering and Web Intelligence
: Text classification, document clustering and similar document analysis tasks are currently the subject of significant global research, since such areas underpin web intelligence,...
Mark P. Sinka, David Corne