Sciweavers

2027 search results - page 46 / 406
» When is it best to best-respond
Sort
View
GLOBECOM
2008
IEEE
14 years 4 months ago
Joint Power Loading of Data and Pilots in OFDM Using Imperfect Channel State Information at the Transmitter
— The search for optimality in the design of channel precoders and training symbols in block processing communication systems is one of paramount importance. Finding the best tra...
Chitaranjan P. Sukumar, Ricardo Merched, Ahmed M. ...
IWPC
2006
IEEE
14 years 4 months ago
How Webmining and Coupling Metrics Improve Early Program Comprehension
During initial program comprehension, software engineers could benefit from knowing the most need-to-beunderstood classes in the system under study in order to kick-start their s...
Andy Zaidman, Bart Du Bois, Serge Demeyer
ISSAC
2004
Springer
135views Mathematics» more  ISSAC 2004»
14 years 3 months ago
The truncated fourier transform and applications
In this paper, we present a truncated version of the classical Fast Fourier Transform. When applied to polynomial multiplication, this algorithm has the nice property of eliminati...
Joris van der Hoeven
ISW
2004
Springer
14 years 3 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
SDMW
2004
Springer
14 years 3 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker