Sciweavers

451 search results - page 42 / 91
» Constrained Sums of Information Systems
Sort
View
ICASSP
2008
IEEE
15 years 8 months ago
Non-iterative multiuser MIMO coordinated beamforming with limited feedforward
This paper proposes non-iterative coordinated beamforming algorithms for a multiuser MIMO (multiple input multiple output) system with multiple antennas at the transmitter and mul...
Chan-Byoung Chae, Takao Inoue, Robert W. Heath Jr....
TIT
2008
110views more  TIT 2008»
15 years 1 months ago
Optimal Cross-Layer Scheduling of Transmissions Over a Fading Multiaccess Channel
We consider the problem of several users transmitting packets to a base station, and study an optimal scheduling formulation involving three communication layers, namely, the mediu...
Munish Goyal, Anurag Kumar, Vinod Sharma
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 8 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White
NETWORKS
2006
15 years 1 months ago
Approximation algorithms for channel allocation problems in broadcast networks
We study two packing problems that arise in the area of dissemination-based information systems; a second theme is the study of distributed approximation algorithms. The problems c...
Rajiv Gandhi, Samir Khuller, Aravind Srinivasan, N...
CSFW
2006
IEEE
15 years 8 months ago
Decentralized Robustness
Robustness links confidentiality and integrity properties of a computing system and has been identified as a useful property for characterizing and enforcing security. Previous ...
Stephen Chong, Andrew C. Myers