Sciweavers

1756 search results - page 326 / 352
» Cognitive Network Interference
Sort
View
PETRA
2010
ACM
14 years 10 months ago
Optimizing pervasive sensor data acquisition utilizing missing values substitution
Acquisition of pervasive sensor data can be often unsuccessful due to power outage at nodes, time synchronization issues, interference, network transmission failures or sensor har...
M. Michalopoulos, Christos Anagnostopoulos, Charal...
87
Voted
CORR
2008
Springer
127views Education» more  CORR 2008»
14 years 9 months ago
Energy-Efficient Resource Allocation in Multiuser MIMO Systems: A Game-Theoretic Framework
This paper focuses on the cross-layer issue of resource allocation for energy efficiency in the uplink of a multiuser MIMO wireless communication system. Assuming that all of the ...
Stefano Buzzi, H. Vincent Poor, Daniela Saturnino
DAM
2006
132views more  DAM 2006»
14 years 9 months ago
On the combinatorial structure of chromatic scheduling polytopes
Chromatic scheduling polytopes arise as solution sets of the bandwidth allocation problem in certain radio access networks, supplyingwirelessaccesstovoice/datacommunicationnetwork...
Javier Marenco, Annegret Wagler
JDA
2008
84views more  JDA 2008»
14 years 9 months ago
Red-blue covering problems and the consecutive ones property
Set Cover problems are of core importance in many applications. In recent research, the "red-blue variants" where blue elements all need to be covered whereas red elemen...
Michael Dom, Jiong Guo, Rolf Niedermeier, Sebastia...
JHSN
2006
95views more  JHSN 2006»
14 years 9 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...