Sciweavers

956 search results - page 100 / 192
» Source Constrained Clustering
Sort
View
DCC
2008
IEEE
15 years 9 months ago
High-Resolution Functional Quantization
Suppose a function of N real source variables XN 1 = (X1, X2, . . . , XN ) is desired at a destination constrained to receive a limited number of bits. If the result of evaluating...
Vinith Misra, Vivek K. Goyal, Lav R. Varshney
ICC
2009
IEEE
116views Communications» more  ICC 2009»
15 years 4 months ago
Markov Chain Monte Carlo Detection Methods for High SNR Regimes
—Statistical detectors that are based on Markov chain Monte Carlo (MCMC) simulators have emerged as promising low-complexity solutions to both multiple-input multipleoutput (MIMO...
Salam Akoum, Ronghui Peng, Rong-Rong Chen, Behrouz...
IPPS
2007
IEEE
15 years 4 months ago
A Combinatorial Analysis of Distance Reliability in Star Network
This paper addresses a constrained two-terminal reliability measure referred to as Distance Reliability (DR) between the source node u and the destination node I with the shortest...
Xiaolong Wu, Shahram Latifi, Yingtao Jiang
MSN
2005
Springer
251views Sensor Networks» more  MSN 2005»
15 years 3 months ago
ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks
In this paper, we propose a Multicast Routing Protocol termed ZBMRP (Zone Based Multicast Routing Protocol) for Mobile Ad Hoc Networks (MANETs). ZBMRP applies on-demand procedures ...
Jieying Zhou, Simeng Wang, Jing Deng, Hongda Feng
INFOCOM
2000
IEEE
15 years 2 months ago
Adaptive Two-Level Unequal Error Protection Convolutional Code Scheme for Wireless ATM Networks
Abstract—Because the wireless asynchronous transfer mode (ATM) networks are often constrained with the limited link bandwidth and error prone characteristics, forward error corre...
Zhenqiang Sun, Shigetomo Kimura, Yoshihiko Ebihara