Sciweavers

1146 search results - page 226 / 230
» Finite cupping sets
Sort
View
TSP
2008
109views more  TSP 2008»
13 years 7 months ago
Constrained Tensor Modeling Approach to Blind Multiple-Antenna CDMA Schemes
In this paper, we consider an uplink multiple-antenna Code-Division Multiple-Access (CDMA) system linking several multiple-antenna mobile users to one multiple-antenna base-statio...
André L. F. de Almeida, Gérard Favie...
AIS
2000
Springer
13 years 7 months ago
The culture of the artificial
The expression 'nature of the artificial' can be understood in (at least) two distinct, yet possibly related, senses as denoting (i) the essence (or whatness) of the art...
Massimo Negrotti
CAL
2002
13 years 7 months ago
MinneSPEC: A New SPEC Benchmark Workload for Simulation-Based Computer Architecture Research
Abstract-- Computer architects must determine how to most effectively use finite computational resources when running simulations to evaluate new architectural ideas. To facilitate...
A. J. KleinOsowski, David J. Lilja
QEST
2010
IEEE
13 years 5 months ago
Timed Branching Processes
We study Timed Branching Processes (TBPs), a natural extension of (multitype) Branching Processes (BPs) where each entity is equipped with a finite set of private continuous variab...
Ashutosh Trivedi, Dominik Wojtczak
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 5 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...