Sciweavers

2621 search results - page 452 / 525
» Near orders and codes
Sort
View
ENTCS
2007
114views more  ENTCS 2007»
15 years 4 months ago
Reporting Failures in Functional Logic Programs
Computing with failures is a typical programming technique in functional logic programs. However, there are also situations where a program should not fail (e.g., in a determinist...
Michael Hanus
JSAC
2006
133views more  JSAC 2006»
15 years 4 months ago
Code-aided joint channel and frequency offset estimation for DS-CDMA
This paper deals with joint data detection, synchronization and channel parameter estimation for Direct-Sequence Code Division Multiple Access (DS-CDMA) systems over frequency sel...
Mamoun Guenach, Frederik Simoens, Henk Wymeersch, ...
ENTCS
2007
117views more  ENTCS 2007»
15 years 4 months ago
Relating Hybrid Chi to Other Formalisms
The hybrid χ (Chi) formalism is suited to modeling, simulation and verification of hybrid systems. It integrates concepts from dynamics and control theory with concepts from com...
D. A. van Beek, J. E. Rooda, Ramon R. H. Schiffele...
NETWORK
2006
177views more  NETWORK 2006»
15 years 4 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
PE
2006
Springer
114views Optimization» more  PE 2006»
15 years 4 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong