—We consider an ad hoc network where frequency hopping (FH), convolutional coding and multiple antennas are employed in order to combat fading and multiple access (MA) interferen...
Kostas Stamatiou, John G. Proakis, James R. Zeidle...
Various techniques have been developed for different query types in content-based image retrieval (CBIR) systems such as sampling queries, constrained sampling queries, multiple c...
In this paper we address the problem of combining multiple clusterings without access to the underlying features of the data. This process is known in the literature as clustering...
This study examined the interplay among processor speed, cluster interconnect and file I/O, using parallel applications to quantify interactions. We focused on a common case wher...
— With the proliferation of air interface technologies, there are increasingly multi-mode user equipment devices (UEs) that can operate in more than one technology, although not ...