Sciweavers

250 search results - page 14 / 50
» Accessible games SIG
Sort
View
71
Voted
MM
2010
ACM
121views Multimedia» more  MM 2010»
14 years 10 months ago
Implementation and demonstration of a credit-based home access point
The increasing availability of high speed Internet access and the decreasing cost of wireless technologies has increased the number of devices in the home that wirelessly connect ...
Choong-Soo Lee, Mark Claypool, Robert E. Kinicki
JSAC
2010
138views more  JSAC 2010»
14 years 8 months ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar
JSAC
2008
125views more  JSAC 2008»
14 years 9 months ago
Optimal Competitive Algorithms for Opportunistic Spectrum Access
We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter must...
Nicholas B. Chang, Mingyan Liu
ICASSP
2011
IEEE
14 years 1 months ago
Game-theoretic resource allocation in relay-assisted DS/CDMA systems with successive interference cancellation
The problem of non-cooperative resource allocation in an amplifyand-forward relay-assisted DS/CDMA system is addressed. The relay designs its amplify-and-forward matrix for achiev...
Alessio Zappone, Eduard A. Jorswieck
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
15 years 4 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill