Sciweavers

501 search results - page 12 / 101
» Redundancy and Diversity in Security
Sort
View
TCOM
2008
83views more  TCOM 2008»
13 years 9 months ago
Toward a unified framework for modeling and analysis of diversity in joint source-channel coding
The study of Joint Source-Channel Coding (JSCC) systems faces one major challenge in obtaining an analytical expression for the function that links end-to-end distortion with chann...
Andres Kwasinski, K. J. Ray Liu
DSN
2003
IEEE
14 years 2 months ago
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case Study
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
MOBIWAC
2009
ACM
14 years 1 months ago
Adaptive, direction-aware data dissemination for diverse sensor mobility
We consider sensor networks where the sensor nodes are attached on entities that move in a highly dynamic, heterogeneous manner. To capture this mobility diversity we introduce a ...
Azzedine Boukerche, Dionysios Efstathiou, Sotiris ...
SIGIR
2008
ACM
13 years 9 months ago
Novelty and diversity in information retrieval evaluation
Evaluation measures act as objective functions to be optimized by information retrieval systems. Such objective functions must accurately reflect user requirements, particularly w...
Charles L. A. Clarke, Maheedhar Kolla, Gordon V. C...
TWC
2010
13 years 3 months ago
Closed-Loop Transmit Diversity with Imperfect Feedback
The closed-loop transmit diversity technique is used to improve the performance of the downlink channel in MIMO communication systems. In these closed-loop systems, feedback delay...
A. Heidari, Amir K. Khandani