— We consider the uplink power control problem where mobile users in different cells are communicating with their base stations. We formulate the power control problem as the min...
Sundhar Srinivasan Ram, Venugopal V. Veeravalli, A...
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
—With the power consumption issue of mobile handset taken into account, Single-carrier FDMA (SC-FDMA) has been selected for 3GPP Long-Term Evolution (LTE) uplink multiple access ...
Suk-Bok Lee, Ioannis Pefkianakis, Adam Meyerson, S...
—The recent three years have witnessed an explosion of networked video sharing, represented by YouTube, as a new killer Internet application. Their sustainable development howeve...
— This paper explores methods and representations that allow two perceptually heterogeneous robots, each of which represents concepts via grounded properties, to transfer knowled...