Sciweavers

942 search results - page 144 / 189
» University Information System Fully Based on WWW
Sort
View
CCS
2008
ACM
13 years 10 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
GLOBECOM
2008
IEEE
14 years 3 months ago
Adaptive Soft Frequency Reuse for Inter-Cell Interference Coordination in SC-FDMA Based 3GPP LTE Uplinks
This paper proposes a decentralized adaptive soft frequency reuse scheme for the uplink of a 4G long-term evolution (LTE) system. While universal frequencies reuse (UFR) is being ...
Xuehong Mao, Amine Maaref, Koon Hoo Teo
DIAL
2004
IEEE
138views Image Analysis» more  DIAL 2004»
14 years 13 days ago
Retrieving Imaged Documents in Digital Libraries Based on Word Image Coding
A great number of documents are scanned and archived in the form of digital images in digital libraries, to make them available and accessible in the Internet. Information retriev...
Yue Lu, Li Zhang, Chew Lim Tan
SIGUCCS
2000
ACM
14 years 1 months ago
Linux and Open Source in the Academic Enterprise
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...
GLOBECOM
2010
IEEE
13 years 6 months ago
Are a Few Neighboring Peers Good Enough?
Most peer-assisted media streaming systems have applied a design philosophy that uses a "mesh" topology of peers: each peer connects to a small number of neighboring peer...
Lili Zhong, Jie Dai, Bo Li, Baochun Li, Hai Jin