Sciweavers

1922 search results - page 47 / 385
» ie 2007
Sort
View
CORR
2007
Springer
123views Education» more  CORR 2007»
13 years 8 months ago
Degrees of Freedom of Wireless X Networks
Abstract— We study the degrees of freedom characterization of wireless X networks, i.e. networks of M distributed single antenna transmitters and N distributed single antenna rec...
Viveck R. Cadambe, Syed Ali Jafar
DEBU
2007
95views more  DEBU 2007»
13 years 8 months ago
Recording Provenance for SQL Queries and Updates
Knowing the origin of data (i.e., where the data was copied or created from)—its provenance—is vital for assessing the trustworthiness of contemporary scientific databases su...
Stijn Vansummeren, James Cheney
ENTCS
2007
111views more  ENTCS 2007»
13 years 8 months ago
Compositional State Space Reduction Using Untangled Actions
We propose a compositional technique for efficient verification of networks of parallel processes. It is based on an automatic analysis of LTSs of individual processes (using a f...
Xu Wang, Marta Z. Kwiatkowska
IANDC
2007
106views more  IANDC 2007»
13 years 8 months ago
Extended visual cryptography schemes
Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image ...
Andreas Klein, Markus Wessler
IJIEM
2007
78views more  IJIEM 2007»
13 years 8 months ago
Supporting the design of service contracts with interaction models
: A service contract typically specifies the service level, i.e., the quality parameters of the service to be performed. In addition to this static part, there is also the need to ...
Peter Rittgen