Sciweavers

329 search results - page 56 / 66
» Elliptic Control by Penalty Techniques with Control Reductio...
Sort
View
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 1 months ago
Cross-Layer Design of Uplink Multiple-Antenna Interference Cancellation for WLAN with CSMA/CA in Open Access Networks
Abstract— The potential of multi-antenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The me...
Alexandr M. Kuzminskiy, Hamid Reza Karimi
ICDE
2007
IEEE
129views Database» more  ICDE 2007»
14 years 1 months ago
Ontology-driven Rule Generalization and Categorization for Market Data
—Radio Frequency Identification (RFID) is an emerging technique that can significantly enhance supply chain processes and deliver customer service improvements. RFID provides use...
Dongwoo Won, Dennis McLeod
CCS
2007
ACM
14 years 1 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
DATE
2003
IEEE
103views Hardware» more  DATE 2003»
14 years 24 days ago
Reduced Delay Uncertainty in High Performance Clock Distribution Networks
The design of clock distribution networks in synchronous digital systems presents enormous challenges. Controlling the clock signal delay in the presence of various noise sources,...
Dimitrios Velenis, Marios C. Papaefthymiou, Eby G....
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 23 days ago
Towards Verifying Parametrised Hardware Libraries with Relative Placement Information
Abstract— This paper presents a framework for verifying compilation tools for parametrised hardware libraries with placement information. Such libraries are captured in Pebble, a...
Steve McKeever, Wayne Luk, Arran Derbyshire