Sciweavers

1548 search results - page 309 / 310
» Estimating Software Vulnerabilities
Sort
View
TASLP
2010
167views more  TASLP 2010»
13 years 1 months ago
Broadband Source Localization From an Eigenanalysis Perspective
Abstract--Broadband source localization has several applications ranging from automatic video camera steering to target signal tracking and enhancement through beamforming. Consequ...
Mehrez Souden, Jacob Benesty, Sofiène Affes
TCOM
2010
101views more  TCOM 2010»
13 years 1 months ago
Spectral efficient transmit diversity techniques without cyclic prefix for fading relay channels
Abstract--This paper proposes spectral efficient relayassisted transmit diversity techniques, i.e., space-time and space-frequency block codes (STBC/SFBC), for single carrier frequ...
Ui-Kun Kwon, Dae-Young Seol, Gi-Hong Im
JCC
2011
154views more  JCC 2011»
12 years 10 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
MANSCI
2011
12 years 10 months ago
Dynamic Price Competition with Fixed Capacities
Many revenue management (RM) industries are characterized by (a) fixed capacities in the short term (e.g., hotel rooms, seats on an airline flight), (b) homogeneous products (e....
Victor Martínez-de-Albéniz, Kalyan T...
MOBISYS
2011
ACM
12 years 10 months ago
AppJoy: personalized mobile application discovery
The explosive growth of the mobile application market has made it a significant challenge for the users to find interesting applications in crowded App Stores. To alleviate this...
Bo Yan, Guanling Chen