Sciweavers

4000 search results - page 606 / 800
» Simulation down under
Sort
View
JSAC
2008
117views more  JSAC 2008»
15 years 5 months ago
A design framework for limited feedback MIMO systems with zero-forcing DFE
Abstract--We consider the design of multiple-input multipleoutput communication systems with a linear precoder at the transmitter, zero-forcing decision feedback equalization (ZFDF...
Michael Botros Shenouda, Timothy N. Davidson
JSAC
2008
118views more  JSAC 2008»
15 years 5 months ago
Auction-Based Resource Allocation for Cooperative Communications
Abstract--Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper...
Jianwei Huang, Zhu Han, Mung Chiang, H. Vincent Po...
JCM
2006
144views more  JCM 2006»
15 years 5 months ago
Using Micro-Genetic Algorithms to Improve Localization in Wireless Sensor Networks
Wireless sensor networks are widely adopted in many location-sensitive applications including disaster management, environmental monitoring, military applications where the precise...
Vincent Tam, King-Yip Cheng, King-Shan Lui
JSCIC
2008
148views more  JSCIC 2008»
15 years 5 months ago
Finite Element-Based Level Set Methods for Higher Order Flows
In this paper we shall discuss the numerical simulation of higher order geometric flows by level set methods. Main examples under considerations are surface diffusion and the Will...
Martin Burger, Christina Stöcker, Axel Voigt
JHSN
2006
95views more  JHSN 2006»
15 years 5 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...