Sciweavers

626 search results - page 86 / 126
» Power Control for User Cooperation
Sort
View
117
Voted
CHI
2007
ACM
15 years 7 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
134
Voted
TIT
2010
115views Education» more  TIT 2010»
14 years 10 months ago
On resource allocation in fading multiple-access channels-an efficient approximate projection approach
We consider the problem of rate and power allocation in a multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave ut...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
120
Voted
HPCS
2005
IEEE
15 years 9 months ago
Comparison of Advanced Authorisation Infrastructures for Grid Computing
The widespread use of Grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed effic...
A. J. Stell, Richard O. Sinnott, J. P. Watt
CCE
2008
15 years 3 months ago
A hierarchical decision procedure for productivity innovation in large-scale petrochemical processes
Maintaining the best quality is essential for the survival of a company in a globally competitive world. Six Sigma activity has been widely accepted as one of the most efficient a...
Chonghun Han, Minjin Kim, En Sup Yoon
171
Voted
TWC
2008
154views more  TWC 2008»
15 years 3 months ago
MEERA: Cross-Layer Methodology for Energy Efficient Resource Allocation in Wireless Networks
Abstract-- In many portable devices, wireless network interfaces consume upwards of 30% of scarce system energy. Reducing the transceiver's power consumption to extend the sys...
Sofie Pollin, Rahul Mangharam, Bruno Bougard, Lies...