Sciweavers

36320 search results - page 7230 / 7264
» From Code to Models
Sort
View
INFOCOM
2010
IEEE
15 years 29 days ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
INFOCOM
2010
IEEE
15 years 29 days ago
On the Fundamental Limits of Broadcasting in Wireless Mobile Networks
Abstract—In this paper, we investigate the fundamental properties of broadcasting in mobile wireless networks. In particular, we characterize broadcast capacity and latency of a ...
Giovanni Resta, Paolo Santi
TIT
2008
105views more  TIT 2008»
15 years 29 days ago
State Discrimination With Post-Measurement Information
We introduce a new state discrimination problem in which we are given additional information about the state after the measurement, or more generally, after a quantum memory bound ...
Manuel A. Ballester, Stephanie Wehner, Andreas Win...
161
Voted
JIDM
2010
160views more  JIDM 2010»
15 years 29 days ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
JOCN
2010
126views more  JOCN 2010»
15 years 29 days ago
Evidence for Early Morphological Decomposition in Visual Word Recognition
■ We employ a single-trial correlational MEG analysis technique to investigate early processing in the visual recognition of morphologically complex words. Three classes of affi...
Olla Solomyak, Alec Marantz
« Prev « First page 7230 / 7264 Last » Next »