Sciweavers

1033 search results - page 40 / 207
» Properties of Exercise Strategies
Sort
View
TCOM
2008
110views more  TCOM 2008»
14 years 9 months ago
Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels
We consider cross-layer adaptive transmission for a single-user system with stochastic data traffic and a timevarying wireless channel. The objective is to vary the transmit power ...
Anh Tuan Hoang, Mehul Motani
NA
2007
100views more  NA 2007»
14 years 9 months ago
Periodization strategy may fail in high dimensions
Abstract. We discuss periodization of smooth functions f of d variables for approximation of multivariate integrals. The benefit of periodization is that we may use lattice rules,...
Frances Y. Kuo, Ian H. Sloan, Henryk Wozniakowski
CORR
2010
Springer
113views Education» more  CORR 2010»
14 years 8 months ago
A Strategy to enable Prefix of Multicast VoD through dynamic buffer allocation
In this paper we have proposed a dynamic buffer allocation algorithm for the prefix, based on the popularity of the videos. More cache blocks are allocated for most popular videos...
T. R. Gopalakrishnan Nair, P. Jayarekha
IEAAIE
2010
Springer
14 years 7 months ago
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation p...
Nele Verbiest, Chris Cornelis, Patricia Victor, En...
EUROMICRO
2007
IEEE
15 years 1 months ago
Guiding Component-Based Hardware/Software Co-Verification with Patterns
In component-based hardware/software co-verification, properties of an embedded system are established from properties of its hardware and software components. A major challenge i...
Juncao Li, Fei Xie, Huaiyu Liu