Sciweavers

2028 search results - page 311 / 406
» Deriving Relation Keys from XML Keys
Sort
View
FGCS
2008
159views more  FGCS 2008»
15 years 4 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
CN
2006
126views more  CN 2006»
15 years 4 months ago
A measurement study of correlations of Internet flow characteristics
Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of s...
Kun-Chan Lan, John S. Heidemann
CORR
2006
Springer
127views Education» more  CORR 2006»
15 years 4 months ago
On the Peak-to-Mean Envelope Power Ratio of Phase-Shifted Binary Codes
The peak-to-mean envelope power ratio (PMEPR) of a code employed in orthogonal frequencydivision multiplexing (OFDM) systems can be reduced by permuting its coordinates and by rot...
Kai-Uwe Schmidt
CORR
2007
Springer
132views Education» more  CORR 2007»
15 years 4 months ago
Matroid Pathwidth and Code Trellis Complexity
We relate the notion of matroid pathwidth to the minimum trellis state-complexity (which we term trellis-width) of a linear code, and to the pathwidth of a graph. By reducing from ...
Navin Kashyap
INFORMATICALT
2006
108views more  INFORMATICALT 2006»
15 years 4 months ago
Experiments with Hybrid Genetic Algorithm for the Grey Pattern Problem
Recently, genetic algorithms (GAs) and their hybrids have achieved great success in solving difficult combinatorial optimization problems. In this paper, the issues related to the ...
Alfonsas Misevicius