Sciweavers

292 search results - page 45 / 59
» Exploiting Dead Value Information
Sort
View
IS
2006
13 years 7 months ago
Artemis: Deploying semantically enriched Web services in the healthcare domain
An essential element in defining the semantic of Web services is the domain knowledge. Medical informatics is one of the few domains to have considerable domain knowledge exposed ...
Asuman Dogac, Gokce Laleci, Serkan Kirbas, Yildira...
JSAC
2008
106views more  JSAC 2008»
13 years 7 months ago
Enhanced multiuser random beamforming: dealing with the not so large number of users case
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...
Marios Kountouris, David Gesbert, Thomas Sälz...
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 7 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
Threshold Selection for SNR-based Selective Digital Relaying in Cooperative Wireless Networks
This paper studies selective relaying schemes based on signal-to-noise-ratio (SNR) to minimize the end-to-end (e2e) bit error rate (BER) in cooperative digital relaying systems usi...
Furuzan Atay Onat, Abdulkareem Adinoyi, Yijia Fan,...
GIS
1998
ACM
13 years 7 months ago
Natural-Language Spatial Relations Between Linear and Areal Objects: The Topology and Metric of English-Language Terms
Spatial relations are the basis for many selections users perform when they query geographic information systems (GISs). Although such query languages use natural-language-like te...
A. Rashid B. M. Shariff, Max J. Egenhofer, David M...