Sciweavers

3303 search results - page 103 / 661
» Multidimensional Access Methods
Sort
View
CISS
2008
IEEE
14 years 3 months ago
Secure transmission power of cognitive radios for dynamic spectrum access applications
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
Xiaohua Li, Jinying Chen, Fan Ng
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 3 months ago
Exact Multiple Access Analysis for Pulsed DS-UWB Systems with Episodic Transmission in Flat Nakagami Fading
— Exact bit error probabilities (BEP) are derived in closed form for pulsed binary direct sequence ultra-wideband (DS-UWB) multiple access systems in flat Nakagami fading channe...
Mohammad Azizur Rahman, Shigenobu Sasaki, Hisakazu...
ACSC
2004
IEEE
14 years 23 days ago
On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm
Matrix multiplication is a basic computing operation. Whereas it is basic, it is also very expensive with a straight forward technique of O(N3 ) runtime complexity. More complex s...
Hossam A. ElGindy, George Ferizis
DEXA
2006
Springer
160views Database» more  DEXA 2006»
14 years 21 days ago
Clustering of Search Engine Keywords Using Access Logs
Abstract. It the becomes possible that users can get kinds of information by just inputting search keyword(s) representing the topic which users are interested in. But it is not al...
Shingo Otsuka, Masaru Kitsuregawa
DOA
2001
132views more  DOA 2001»
13 years 10 months ago
Mobile RMI: Supporting Remote Access to Java Server Objects on Mobile Hosts
Java Remote Method Invocation (RMI) is a specification for building distributed object-oriented applications. RMI was designed primarily for use in conventional, wired computing e...
Tom Wall, Vinny Cahill