Sciweavers

2897 search results - page 520 / 580
» Mobile Code Security
Sort
View
USITS
2001
13 years 11 months ago
End-to-End WAN Service Availability
Abstract--This paper seeks to understand how network failures affect the availability of service delivery across wide-area networks (WANs) and to evaluate classes of techniques for...
Bharat Chandra, Michael Dahlin, Lei Gao, Amol Naya...
WSC
2004
13 years 11 months ago
Modeling Real-World Control Systems: Beyond Hybrid Systems
Hybrid system modeling refers to the construction of system models combining both continuous and discrete dynamics. These models can greatly reduce the complexity of a phystem mod...
Stephen Neuendorffer
ICASSP
2010
IEEE
13 years 10 months ago
Enhanced trellis based vector quantization for coordinated beamforming
This paper presents two techniques to boost the quantization performance of trelli-based beamforming vector quantization schemes [?], [?]. It is well known that tail-biting trelli...
Chun Kin Au-Yeung, Shahab Sanayei
CORR
2006
Springer
52views Education» more  CORR 2006»
13 years 10 months ago
A SIMO Fiber Aided Wireless Network Architecture
Abstract-- The concept of a fiber aided wireless network architecture (FAWNA) is introduced in [Ray et al., Allerton Conference 2005], which allows high-speed mobile connectivity b...
Siddharth Ray, Muriel Médard, Lizhong Zheng
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 10 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald