Sciweavers

146 search results - page 26 / 30
» Modeling System Safety Requirements Using Input Output Const...
Sort
View
TCOM
2010
195views more  TCOM 2010»
13 years 2 months ago
Coherent and Differential Space-Time Shift Keying: A Dispersion Matrix Approach
Abstract--Motivated by the recent concept of Spatial Modulation (SM), we propose a novel Space-Time Shift Keying (STSK) modulation scheme for Multiple-Input Multiple-Output (MIMO) ...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
VLSISP
2008
100views more  VLSISP 2008»
13 years 7 months ago
Memory-constrained Block Processing for DSP Software Optimization
Digital signal processing (DSP) applications involve processing long streams of input data. It is important to take into account this form of processing when implementing embedded ...
Ming-Yung Ko, Chung-Ching Shen, Shuvra S. Bhattach...
BMCBI
2010
133views more  BMCBI 2010»
13 years 8 months ago
Stability analysis of the GAL regulatory network in Saccharomyces cerevisiae and Kluyveromyces lactis
Background: In the yeast Saccharomyces cerevisiae, interactions between galactose, Gal3p, Gal80p, and Gal4p determine the transcriptional status of the genes required for the gala...
Vishwesh V. Kulkarni, Venkatesh Kareenhalli, Pushk...
IJCAI
1989
13 years 9 months ago
Functional Representation of Designs and Redesign Problem Solving
gn problem can be abstractly characterized as a constrained function-to-structure mapping. The de­ sign task takes as input the specifications of the desired functions of a device...
Ashok K. Goel, B. Chandrasekaran
ACSAC
2002
IEEE
14 years 26 days ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...