Sciweavers

438 search results - page 34 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
TELETRAFFIC
2007
Springer
14 years 1 months ago
A Phase-Type Based Markov Chain Model for IEEE 802.16e Sleep Mode and Its Performance Analysis
Abstract. To support battery powered mobile broadband wireless access devices efficiently, IEEE 802.16e defines a sleep mode operation for conserving the power of mobile terminals...
Zhisheng Niu, Yanfeng Zhu, Vilius Benetis
EMSOFT
2010
Springer
13 years 5 months ago
Load-based schedulability analysis of certifiable mixed-criticality systems
Many safety-critical embedded systems are subject to certification requirements. However, only a subset of the functionality of the system may be safety-critical and hence subject...
Haohan Li, Sanjoy K. Baruah
CORR
2011
Springer
177views Education» more  CORR 2011»
12 years 11 months ago
Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks
The tremendous capacity gains promised by space division multiple access (SDMA) depend critically on the accuracy of the transmit channel state information. In the broadcast chann...
Marios Kountouris, Jeffrey G. Andrews
BMCBI
2010
112views more  BMCBI 2010»
13 years 7 months ago
PhenoFam-gene set enrichment analysis through protein structural information
Background: With the current technological advances in high-throughput biology, the necessity to develop tools that help to analyse the massive amount of data being generated is e...
Maciej Paszkowski-Rogacz, Mikolaj Slabicki, M. Ter...
POPL
1998
ACM
13 years 11 months ago
Local Type Inference
constraint solver. The other infers annotations on bound variables in function abstractions by propagating type constraints downward from enclosing application nodes. We motivate o...
Benjamin C. Pierce, David N. Turner