Sciweavers

2446 search results - page 379 / 490
» Principles of dataspace systems
Sort
View
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
14 years 3 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
PIMRC
2008
IEEE
14 years 3 months ago
The design and detection of signature sequences in time-frequency selective channel
Abstract— In a slot-synchronized wireless communication system, a set of signature sequences can be derived by circularly shifting a base sequence with good auto correlation prop...
Jiann-Ching Guey
SUTC
2008
IEEE
14 years 3 months ago
Service-Oriented Design Methodology for Wireless Sensor Networks: A View through Case Studies
— In this paper we discuss the design methodology based on the service-oriented architecture and agile development principles for wireless embedded and sensor networks (WSNs). Th...
Elena Meshkova, Janne Riihijärvi, Frank Oldew...
WCNC
2008
IEEE
14 years 3 months ago
An Opportunistic Scheduling Scheme with Minimum Data-Rate Guarantees for OFDMA
Abstract—We tackle the problem of providing minimum datarate guarantees for different classes-of-service in an OFDMAbased network, while obtaining a high system throughput. Our a...
Razvan Pitic, Antonio Capone
WETICE
2008
IEEE
14 years 3 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...