Sciweavers

2938 search results - page 572 / 588
» On obfuscating point functions
Sort
View
JSAC
2007
180views more  JSAC 2007»
13 years 7 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
TWC
2008
99views more  TWC 2008»
13 years 7 months ago
Distributed Antenna Systems with Randomness
Abstract--In a cellular distributed antenna system (DAS), distributed antenna elements (AEs) are connected to the base station via an offline dedicated link, e.g. fiber optics or l...
Jun Zhang, Jeffrey G. Andrews
VC
2008
93views more  VC 2008»
13 years 7 months ago
Real-time editing and relighting of homogeneous translucent materials
Existing techniques for fast, high-quality rendering of translucent materials often fix BSSRDF parameters at precomputation time. We present a novel method for accurate rendering a...
Rui Wang 0004, Ewen Cheslack-Postava, Rui Wang 000...
BMCBI
2004
127views more  BMCBI 2004»
13 years 7 months ago
Optimized LOWESS normalization parameter selection for DNA microarray data
Background: Microarray data normalization is an important step for obtaining data that are reliable and usable for subsequent analysis. One of the most commonly utilized normaliza...
John A. Berger, Sampsa Hautaniemi, Anna-Kaarina J&...