Sciweavers

3104 search results - page 84 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
TOOLS
2008
IEEE
15 years 11 months ago
The Meta in Meta-object Architectures
Abstract. Behavioral reflection is crucial to support for example functional upgrades, on-the-fly debugging, or monitoring critical applications. However the use of reflective f...
Marcus Denker, Mathieu Suen, Stéphane Ducas...
ENTCS
2008
64views more  ENTCS 2008»
15 years 4 months ago
General Refinement, Part Two: Flexible Refinement
In the previous, companion, paper [13] to this paper we introduced our general model of refinement, discussed ideas around determinism and interfaces that the general definition r...
Steve Reeves, David Streader
PIMRC
2010
IEEE
15 years 2 months ago
Self-optimizing routing in MANETs with multi-class flows
In this paper we show how game theory and Gibbs sampling techniques can be used to design a self-optimizing algorithm for minimizing end-to-end delays for all flows in a multi-clas...
Pierre Coucheney, Bruno Gaujal, Corinne Touati
WCNC
2010
IEEE
15 years 2 months ago
Linear and Non-Linear Detection for MIMO-OFDM Systems with Linear Precoding and Spatial Correlation
Precoding at the transmitter side facilitates the use of linear MIMO detection schemes, which are attractive for low-complexity receiver implementations. However, their performance...
Eckhard Ohlmer, Gerhard Fettweis
129
Voted
ICC
2009
IEEE
113views Communications» more  ICC 2009»
15 years 2 months ago
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...