Sciweavers

856 search results - page 122 / 172
» Design Guidance through the Controlled Application of Constr...
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
MIMO-Aware Routing in Wireless Mesh Networks
Abstract—Multiple-input and multiple-output (MIMO) technique is considered as one of the most promising emerging wireless technologies that can significantly improve transmissio...
Shan Chu, Xin Wang
TWC
2010
13 years 3 months ago
Adaptive linearly constrained minimum variance beamforming for multiuser cooperative relaying using the kalman filter
In this paper, we consider a wireless communication scenario with multiple source-destination pairs communicating through several cooperative amplify-and-forward relay terminals. T...
Amr El-Keyi, Benoît Champagne
KBS
2007
100views more  KBS 2007»
13 years 8 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
FCCM
2007
IEEE
111views VLSI» more  FCCM 2007»
14 years 3 months ago
A Structural Object Programming Model, Architecture, Chip and Tools for Reconfigurable Computing
A new platform for reconfigurable computing has an object-based programming model, with architecture, silicon and tools designed to faithfully realize this model. The platform is ...
Michael Butts, Anthony Mark Jones, Paul Wasson
CSFW
2011
IEEE
12 years 8 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...