Sciweavers

1974 search results - page 304 / 395
» Conditional Purchase Orders
Sort
View
TIFS
2008
133views more  TIFS 2008»
13 years 9 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
JC
2007
94views more  JC 2007»
13 years 9 months ago
On the complexity of the multivariate Sturm-Liouville eigenvalue problem
We study the complexity of approximating the smallest eigenvalue of −∆ + q with Dirichlet boundary conditions on the d-dimensional unit cube. Here ∆ is the Laplacian, and th...
A. Papageorgiou
JCM
2007
73views more  JCM 2007»
13 years 9 months ago
A Link Adaptation Algorithm in MIMO-based WiMAX Systems
— In order to extend the coverage of wireless communication to metropolitan scale, the Worldwide Interoperability for Microwave Access (WiMAX) standard was developed and ratifie...
Tsz Ho Chan, Mounir Hamdi, Chui Ying Cheung, Maode...
JCP
2007
132views more  JCP 2007»
13 years 9 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
CGF
2005
136views more  CGF 2005»
13 years 9 months ago
Practical CFD Simulations on Programmable Graphics Hardware using SMAC
The explosive growth in integration technology and the parallel nature of rasterization-based graphics APIs changed the panorama of consumer-level graphics: today, GPUs are cheap,...
Carlos Eduardo Scheidegger, João Luiz Dihl ...