Sciweavers

418 search results - page 42 / 84
» Source Controlled Modulation Scheme for Sources with Memory
Sort
View
TCOM
2010
145views more  TCOM 2010»
13 years 6 months ago
Blind Cooperative Diversity Using Distributed Space-Time Coding in Block Fading Channels
— Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. In this paper, we consider a scheme in whic...
Kamel Tourki, Mohamed-Slim Alouini, Luc Deneire
CEC
2011
IEEE
12 years 7 months ago
Inferring transcriptional regulators for sets of co-expressed genes by multi-objective evolutionary optimization
Abstract—Higher organisms are able to respond to continuously changing external conditions by transducing cellular signals into specific regulatory programs, which control gene ...
Adrian Schröder, Clemens Wrzodek, Johannes Wo...
BROADBAND
1998
13 years 9 months ago
Multipath FEC scheme for the ATM adaptation layer AAL5
One approach to facilitate statistical multiplexing of bursty sources in ATM networks is dispersion of the traffic over independent paths. It has been shown within the literature ...
Georg Carle, Stefan Dresler, Jochen H. Schiller
INFOCOM
2006
IEEE
14 years 1 months ago
Analyzing the Receiver Window Modification Scheme of TCP Queues
– Explicit Congestion Notification (ECN) and Active Queue Management (AQM) Schemes such as Random Early Detection (RED), Adaptive Random Early Detection (ARED) and BLUE queues ha...
Visvasuresh Victor Govindaswamy, Gergely V. Z&aacu...
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...