Sciweavers

4266 search results - page 638 / 854
» The container loading problem
Sort
View
TPHOL
2008
IEEE
14 years 2 months ago
Certifying a Termination Criterion Based on Graphs, without Graphs
Although graphs are very common in computer science, they are still very difficult to handle for proof assistants as proving properties of graphs may require heavy computations. T...
Pierre Courtieu, Julien Forest, Xavier Urbain
VTC
2008
IEEE
102views Communications» more  VTC 2008»
14 years 2 months ago
CQI Feedback Reduction Based on Spatial Correlation in OFDMA System
— In OFDMA systems, channel quality information (CQI) feedback is used to determine the modulation and coding level of a mobile station (MS). When the MS uses diversity, it trans...
Woongsup Lee, Dong-Ho Cho
WCNC
2008
IEEE
14 years 2 months ago
Senslets- Applets for the Sensor Internet
The Sensor Internet provides access to sensor services by connecting sensor nodes to the Internet infrastructure. To achieve this, current solutions rely on fixed access points or ...
Frank Siegemund, Muhammad Haroon, Junaid Ansari, P...
ACSAC
2007
IEEE
14 years 2 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
AINA
2007
IEEE
14 years 2 months ago
Using Web Directories for Similarity Measurement in Personal Name Disambiguation
In this paper, we target on the problem of personal name disambiguation in search results returned by personal name queries. Usually, a personal name refers to several people. The...
Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, J...