Sciweavers

1054 search results - page 209 / 211
» Guarded Expressions in Practice
Sort
View
TSMC
2010
13 years 4 months ago
Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption
In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the fuzzy commitment scheme, helper data system, fuzzy...
Emile J. C. Kelkboom, Gary Garcia Molina, Jeroen B...
TWC
2010
13 years 4 months ago
Dual-hop adaptive packet transmission systems with regenerative relaying
We propose and analyze two different approaches for performing adaptive modulation and coding (AMC) in dualhop transmission systems, where a source node S communicates with a certa...
Andreas Müller 0001, Hong-Chuan Yang
TWC
2010
13 years 4 months ago
Splitting algorithms for fast relay selection: generalizations, analysis, and a unified view
Relay selection for cooperative communications promises significant performance improvements, and is, therefore, attracting, considerable attention. While several criteria have be...
Virag Shah, Neelesh B. Mehta, Raymond Yim
ICASSP
2011
IEEE
13 years 1 months ago
BEP walls for collaborative spectrum sensing
—The main focus of this paper is to present a performance limitation of collaborative spectrum sensing in cognitive radios with imperfect reporting channels. We consider hard dec...
Sachin Chaudhari, Jarmo Lundén, Visa Koivun...
ASE
2011
13 years 1 months ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie