Sciweavers

95 search results - page 16 / 19
» Extendability of Ternary Linear Codes
Sort
View
ICC
2007
IEEE
149views Communications» more  ICC 2007»
14 years 1 months ago
1+N Protection Against Multiple Link Failures in Mesh Networks
Abstract—In [1], the author presented a 1+N protection strategy against single link failures using a network coding approach on p-Cycles. In this paper, we extend this approach t...
Ahmed E. Kamal
STTT
2010
97views more  STTT 2010»
13 years 5 months ago
Distributed dynamic partial order reduction
Abstract. Runtime (dynamic) model checking is a promising verification methodology for real-world threaded software because of its many features, the prominent ones being: (i) it ...
Yu Yang, Xiaofang Chen, Ganesh Gopalakrishnan, Rob...
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 11 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
MLDM
2007
Springer
14 years 1 months ago
Ensemble-based Feature Selection Criteria
Recursive Feature Elimination (RFE) combined with feature ranking is an effective technique for eliminating irrelevant features when the feature dimension is large, but it is diffi...
Terry Windeatt, Matthew Prior, Niv Effron, Nathan ...
GLOBECOM
2008
IEEE
13 years 8 months ago
User Selection for Multiple-Antenna Broadcast Channel with Zero-Forcing Beamforming
Abstract—This paper investigates the zero-forcing (ZF) beamforming transmit strategy in the multiple-antenna multiuser downlink systems. We consider the case of mobile users equi...
Saeed Kaviani, Witold A. Krzymien