Sciweavers

7475 search results - page 1421 / 1495
» Supporting use case based requirements engineering
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems
—Increasingly wireless networks use multi-antenna nodes as in IEEE 802.11n and 802.16. The Physical layer (PHY) in such systems may use the antennas to provide multiple streams o...
Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Ch...
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 10 months ago
Generic Transformation to Strongly Unforgeable Signatures
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strong...
Qiong Huang, Duncan S. Wong, Yiming Zhao
ICC
2008
IEEE
136views Communications» more  ICC 2008»
15 years 10 months ago
New Beamforming Schemes with Optimum Receive Combining for Multiuser MIMO systems
— In this paper, we present a new beamforming scheme for a downlink of multiuser multiple-input multipleoutput (MIMO) communication systems. Recently, a blockdiagonalization (BD)...
Sang-Rim Lee, Seokhwan Park, Sung Hyun Moon, Inkyu...
VLDB
2005
ACM
162views Database» more  VLDB 2005»
15 years 9 months ago
FiST: Scalable XML Document Filtering by Sequencing Twig Patterns
In recent years, publish-subscribe (pub-sub) systems based on XML document filtering have received much attention. In a typical pubsub system, subscribed users specify their inte...
Joonho Kwon, Praveen Rao, Bongki Moon, Sukho Lee
STOC
2004
ACM
138views Algorithms» more  STOC 2004»
15 years 9 months ago
Know thy neighbor's neighbor: the power of lookahead in randomized P2P networks
Several peer-to-peer networks are based upon randomized graph topologies that permit efficient greedy routing, e.g., randomized hypercubes, randomized Chord, skip-graphs and const...
Gurmeet Singh Manku, Moni Naor, Udi Wieder
« Prev « First page 1421 / 1495 Last » Next »