Sciweavers

17688 search results - page 3500 / 3538
» Data Set Balancing
Sort
View
TSP
2008
109views more  TSP 2008»
15 years 1 months ago
Constrained Tensor Modeling Approach to Blind Multiple-Antenna CDMA Schemes
In this paper, we consider an uplink multiple-antenna Code-Division Multiple-Access (CDMA) system linking several multiple-antenna mobile users to one multiple-antenna base-statio...
André L. F. de Almeida, Gérard Favie...
JPDC
2007
96views more  JPDC 2007»
15 years 1 months ago
Optimal pipeline decomposition and adaptive network mapping to support distributed remote visualization
This paper discusses algorithmic and implementation aspects of a distributed remote visualization system that optimally decomposes and adaptively maps the visualization pipeline t...
Mengxia Zhu, Qishi Wu, Nageswara S. V. Rao, S. Sit...
TWC
2008
154views more  TWC 2008»
15 years 1 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
MAM
2007
127views more  MAM 2007»
15 years 1 months ago
Indoor solar energy harvesting for sensor network router nodes
A unique method has been developed to scavenge solar energy from monocrystalline solar cells to power wireless router nodes that are used in indoor applications. This method elimi...
Abhiman Hande, Todd Polk, William Walker, Dinesh B...
MANSCI
2007
169views more  MANSCI 2007»
15 years 1 months ago
Performance Contracting in After-Sales Service Supply Chains
Performance-based contracting is reshaping service support supply chains in capital intensive industries such as aerospace and defense. Known as Power by the Hour in the private s...
Sang-Hyun Kim, Morris A. Cohen, Serguei Netessine
« Prev « First page 3500 / 3538 Last » Next »