Sciweavers

2853 search results - page 558 / 571
» Finding related tables
Sort
View
TCS
2002
13 years 7 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
TIT
2002
63views more  TIT 2002»
13 years 7 months ago
Structured unitary space-time autocoding constellations
We recently showed that arbitrarily reliable communication is possible within a single coherence interval in Rayleigh flat fading as the symbol-duration of the coherence interval ...
Thomas L. Marzetta, Babak Hassibi, Bertrand M. Hoc...
WINET
2002
144views more  WINET 2002»
13 years 7 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
BMCBI
2010
76views more  BMCBI 2010»
13 years 7 months ago
Validation and characterization of DNA microarray gene expression data distribution and associated moments
Background: The data from DNA microarrays are increasingly being used in order to understand effects of different conditions, exposures or diseases on the modulation of the expres...
Reuben Thomas, Luis de la Torre, Xiaoqing Chang, S...
OIR
2007
95views more  OIR 2007»
13 years 7 months ago
Help features in digital libraries: types, formats, presentation styles, and problems
Purpose – The purpose of this paper is to evaluate Help features in digital libraries and identify problems related to their design. Design/methodology/approach – This study s...
Hong (Iris) Xie