Sciweavers

645 search results - page 68 / 129
» Performance Modeling and Analysis of Context-Aware Mobile So...
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 7 months ago
Cellular Systems with Full-Duplex Amplify-and-Forward Relaying and Cooperative Base-Stations
— In this paper the benefits provided by multi-cell processing of signals transmitted by mobile terminals which are received via dedicated relay terminals (RTs) are assessed. Un...
Oren Somekh, Osvaldo Simeone, H. Vincent Poor, Shl...
SEFM
2006
IEEE
14 years 1 months ago
Describing and Executing Random Reactive Systems
We present an operational model for describing random reactive systems. Some models have already been proposed for this purpose, but they generally aim at performing global reason...
Pascal Raymond, Erwan Jahier, Yvan Roux
DOCENG
2011
ACM
12 years 7 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...
COMPSAC
2006
IEEE
14 years 1 months ago
On the Distribution of Property Violations in Formal Models: An Initial Study
Model-checking techniques are successfully used in the verification of both hardware and software systems of industrial relevance. Unfortunately, the capability of current techni...
Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim...
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee