Sciweavers

2897 search results - page 520 / 580
» Mobile Code Security
Sort
View
106
Voted
USITS
2001
15 years 3 months ago
End-to-End WAN Service Availability
Abstract--This paper seeks to understand how network failures affect the availability of service delivery across wide-area networks (WANs) and to evaluate classes of techniques for...
Bharat Chandra, Michael Dahlin, Lei Gao, Amol Naya...
110
Voted
WSC
2004
15 years 3 months ago
Modeling Real-World Control Systems: Beyond Hybrid Systems
Hybrid system modeling refers to the construction of system models combining both continuous and discrete dynamics. These models can greatly reduce the complexity of a phystem mod...
Stephen Neuendorffer
101
Voted
ICASSP
2010
IEEE
15 years 2 months ago
Enhanced trellis based vector quantization for coordinated beamforming
This paper presents two techniques to boost the quantization performance of trelli-based beamforming vector quantization schemes [?], [?]. It is well known that tail-biting trelli...
Chun Kin Au-Yeung, Shahab Sanayei
CORR
2006
Springer
52views Education» more  CORR 2006»
15 years 2 months ago
A SIMO Fiber Aided Wireless Network Architecture
Abstract-- The concept of a fiber aided wireless network architecture (FAWNA) is introduced in [Ray et al., Allerton Conference 2005], which allows high-speed mobile connectivity b...
Siddharth Ray, Muriel Médard, Lizhong Zheng
115
Voted
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 2 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald