Sciweavers

1215 search results - page 111 / 243
» On modeling, analysis, and optimization of packet aggregatio...
Sort
View
CORR
2011
Springer
178views Education» more  CORR 2011»
14 years 1 months ago
Asymptotic Analysis of Double-Scattering Channels
—We consider a multiple-input multiple-output (MIMO) multiple access channel (MAC), where the channel between each transmitter and the receiver is modeled by the doubly-scatterin...
Jakob Hoydis, Romain Couillet, Mérouane Deb...
WETICE
2008
IEEE
15 years 4 months ago
Information and Regulation in Decentralized Marketplaces for P2P-Grids
Large scale systems such as the Grid need scalable and efficient resource allocation mechanisms to fulfil the requirements of its participants and applications while the whole s...
Xavier León, Xavier Vilajosana, René...
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 3 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
SIGMOD
1996
ACM
120views Database» more  SIGMOD 1996»
15 years 2 months ago
Implementing Data Cubes Efficiently
Decision support applications involve complex queries on very large databases. Since response times should be small, query optimization is critical. Users typically view the data ...
Venky Harinarayan, Anand Rajaraman, Jeffrey D. Ull...
ICASSP
2008
IEEE
15 years 4 months ago
A realistic performance analysis for practical channel-aware scheduling
It is well-known that opportunistic transmission schemes are sumcapacity optimal, in the Shannon sense, for symmetric cellular networks with single-antenna transceivers. However, ...
Pengcheng Zhan, Ramesh Annavajjala, A. Lee Swindle...