Sciweavers

12438 search results - page 161 / 2488
» The Magic of a Number System
Sort
View
ICPP
2008
IEEE
14 years 2 months ago
Bounded LSH for Similarity Search in Peer-to-Peer File Systems
Similarity search has been widely studied in peer-to-peer environments. In this paper, we propose the Bounded Locality Sensitive Hashing (Bounded LSH) method for similarity search...
Yu Hua, Bin Xiao, Dan Feng, Bo Yu
LCN
2008
IEEE
14 years 2 months ago
Optimal distance-based clustering for tag anti-collision in RFID systems
—Tag collisions can impose a major delay in Radio Frequency IDentification (RFID) systems. Such collisions are hard to overcome with passive tags due to their limited capabiliti...
Waleed Alsalih, Kashif Ali, Hossam S. Hassanein
CODES
2007
IEEE
14 years 2 months ago
Dynamic security domain scaling on symmetric multiprocessors for future high-end embedded systems
We propose a method for dynamic security domain scaling on SMPs that offers both highly scalable performance and high security for future high-end embedded systems. Its most impor...
Hiroaki Inoue, Akihisa Ikeno, Tsuyoshi Abe, Junji ...
ICC
2007
IEEE
182views Communications» more  ICC 2007»
14 years 2 months ago
BER Analysis of MIMO-SVD Systems with Channel Estimation Error and Feedback Delay
— This paper analyzes the average bit error rate (BER) performance of singular value decomposition-based multiple-input multiple-output systems with channel estimation error and ...
Edward K. S. Au, Shi Jin, Matthew R. McKay, Wai Ho...
ICCCN
2007
IEEE
14 years 2 months ago
An Efficient Detection Technique for SC-FDE Systems with Multiple Packet Collisions
- Usually, packets involved in a collision are lost, requiring the retransmission of all packets. However, if we do not discard collided packets and we use proper retransmissions w...
Rui Dinis, Marco Serrazina, Paulo Carvalho