Sciweavers

4273 search results - page 752 / 855
» Improving proactive information systems
Sort
View
COMSUR
2007
101views more  COMSUR 2007»
13 years 10 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CORR
2007
Springer
92views Education» more  CORR 2007»
13 years 10 months ago
Bit-Interleaved Coded Multiple Beamforming with Imperfect CSIT
This paper addresses the performance of bit-interleaved coded multiple beamforming (BICMB) [1], [2] with imperfect knowledge of beamforming vectors. Most studies for limited-rate ...
Ersin Sengul, Ender Ayanoglu
JSAC
2008
106views more  JSAC 2008»
13 years 10 months ago
Enhanced multiuser random beamforming: dealing with the not so large number of users case
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...
Marios Kountouris, David Gesbert, Thomas Sälz...
DSS
2007
124views more  DSS 2007»
13 years 10 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
IAJIT
2007
146views more  IAJIT 2007»
13 years 10 months ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...