Sciweavers

4498 search results - page 65 / 900
» The Power of Data
Sort
View
VTC
2007
IEEE
15 years 4 months ago
Modeling UpLink Power Control with Outage Probabilities
We investigate models for uplink interference in wireless systems. Our models account for the effects of outage probabilities. Such an accounting requires a nonlinear, even nonco...
Kenneth L. Clarkson, K. Georg Hampel, John D. Hobb...
GLOBECOM
2006
IEEE
15 years 3 months ago
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
— We study the downlink coverage of a base station terminal (BST), which has access to a relay node. Continuing a previous study in which the BST is assumed to provide a variable...
Junjik Bae, Randall Berry, Michael L. Honig
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 3 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
DAC
2010
ACM
15 years 1 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
CORR
2011
Springer
158views Education» more  CORR 2011»
14 years 4 months ago
The power and Arnoldi methods in an algebra of circulants
Circulant matrices play a central role in a recently proposed formulation of three-way data computations. In this setting, a three-way table corresponds to a matrix where each “...
David F. Gleich, Chen Greif, James M. Varah