Sciweavers

15782 search results - page 3003 / 3157
» Network Optimization and Control
Sort
View
141
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 3 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
145
Voted
CORR
2008
Springer
208views Education» more  CORR 2008»
15 years 3 months ago
Equilibria, Fixed Points, and Complexity Classes
Many models from a variety of areas involve the computation of an equilibrium or fixed point of some kind. Examples include Nash equilibria in games; market equilibria; computing o...
Mihalis Yannakakis
CORR
2008
Springer
128views Education» more  CORR 2008»
15 years 3 months ago
Opportunistic Collaborative Beamforming with One-Bit Feedback
An energy-efficient opportunistic collaborative beamformer with one-bit feedback is proposed for ad hoc sensor networks over Rayleigh fading channels. In contrast to conventional c...
Man-On Pun, D. Richard Brown III, H. Vincent Poor
151
Voted
CORR
2010
Springer
187views Education» more  CORR 2010»
15 years 3 months ago
Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit
We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. In this problem, at each time, a player chooses K out of N (N > K) arms to play. The state of ...
Haoyang Liu, Keqin Liu, Qing Zhao
120
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 3 months ago
Resource Allocation and Relay Selection for Collaborative Communications
Abstract--We investigate the relay selection problem in a network where users are able to collaborate with each other; decode and forward the messages of each other along with thei...
Saeed Akhavan-Astaneh, Saeed Gazor
« Prev « First page 3003 / 3157 Last » Next »