Sciweavers

727 search results - page 109 / 146
» One line and n points
Sort
View
JSAC
2007
56views more  JSAC 2007»
14 years 10 months ago
Grouping and partner selection in cooperative wireless networks
— Various results to date have demonstrated the advantages of one or several relay nodes assisting transmissions in a wireless network. In many practical scenarios, not all nodes...
Aria Nosratinia, Todd E. Hunter
100
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 10 months ago
Deploying Wireless Networks with Beeps
Abstract. We present the discrete beeping communication model, which assumes nodes have minimal knowledge about their environment and severely limited communication capabilities. S...
Alejandro Cornejo, Fabian Kuhn
66
Voted
CORR
2008
Springer
105views Education» more  CORR 2008»
14 years 10 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
95
Voted
ALENEX
2008
180views Algorithms» more  ALENEX 2008»
14 years 11 months ago
Geometric Algorithms for Optimal Airspace Design and Air Traffic Controller Workload Balancing
The National Airspace System (NAS) is designed to accommodate a large number of flights over North America. For purposes of workload limitations for air traffic controllers, the a...
Amitabh Basu, Joseph S. B. Mitchell, Girishkumar S...
96
Voted
LFP
1992
140views more  LFP 1992»
14 years 11 months ago
Global Tagging Optimization by Type Inference
Tag handling accounts for a substantial amount of execution cost in latently typed languages such as Common LISP and Scheme, especially on architectures that provide no special ha...
Fritz Henglein