Sciweavers

336 search results - page 32 / 68
» Source coding and channel requirements for unstable processe...
Sort
View
SAC
2010
ACM
13 years 8 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
ICASSP
2008
IEEE
14 years 2 months ago
Optimal stochastic dual resource allocation for cognitive radios based on quantized CSI
The present paper deals with dynamic resource management based on quantized channel state information (CSI) for multi-carrier cognitive radio networks comprising primary and secon...
Antonio G. Marqués, Xin Wang, Georgios B. G...
CORR
2008
Springer
124views Education» more  CORR 2008»
13 years 8 months ago
High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding
Abstract--Cooperative transmission is an emerging communication technique that takes advantage of the broadcast nature of wireless channels. However, due to low spectral efficiency...
Zhu Han, Xin Zhang, H. Vincent Poor
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 8 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
ENGL
2008
111views more  ENGL 2008»
13 years 7 months ago
Frameworks of Process Improvement for Mobile Applications
Mobile application development belongs on the complicated, but quite regular software development environment that includes many different solutions possibilities in the developmen...
Haeng-Kon Kim