Sciweavers

375 search results - page 11 / 75
» Accessible Capacity of Secondary Users
Sort
View
106
Voted
IPPS
2008
IEEE
15 years 6 months ago
Resource allocation in a client/server hybrid network for virtual world environments
The creation of a virtual world environment (VWE) has significant costs, such as maintenance of server rooms, server administration, and customer service. The initial development...
Luis Diego Briceno, Howard Jay Siegel, Anthony A. ...
96
Voted
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 16 days ago
On the Capacity of the 2-user Gaussian MAC Interfering with a P2P Link
Abstract--A multiple access channel and a point-to-point channel sharing the same medium for communications are considered. We obtain an outer bound for the capacity region of this...
Anas Chaaban, Aydin Sezgin
90
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Power control in spectrum overlay networks: How to cross a multi-lane highway
—We consider power control in spectrum overlay networks (also referred to as opportunistic spectrum access) where secondary users identify and exploit instantaneous and local spe...
Wei Ren, Qing Zhao, Ashwin Swami
146
Voted
MOBICOM
2009
ACM
15 years 7 months ago
Revenue maximization and distributed power allocation in cognitive radio networks
Cognitive radio is an enabling technology that allows unlicensed users to opportunistically access the spectrum in order to enhance the spectrum efficiency. In this paper, we cons...
Shaolei Ren, Mihaela van der Schaar
ERCIMDL
2004
Springer
70views Education» more  ERCIMDL 2004»
15 years 5 months ago
Media Matrix: Creating Secondary Repositories
Abstract. This paper argues for the necessity of digital libraries to increase access to their holdings and have greater impact on e-learning and education by facilitating the crea...
Mark Kornbluh, Michael Fegan, Dean Rehberger