Sciweavers

1640 search results - page 238 / 328
» Conditional Independence Trees
Sort
View
SAC
2010
ACM
14 years 3 months ago
Analysis of collision probability in unsaturated situation
A large number of the MAC protocols proposed for establishing wireless sensor networks are based on the 802.11 standard. The trade-off in these protocols is the control packet ov...
Qian Dong, Waltenegus Dargie
ICASSP
2009
IEEE
14 years 3 months ago
Using complex-valued ICA to efficiently combine radar polarimetric data for target detection
Target detection in sea clutter is a challenging problem in radar detection, specifically, when the Doppler return of the target and clutter are collocated. Polarization diverse ...
Mike Novey, Tülay Adali
ICC
2009
IEEE
14 years 3 months ago
Separable Implementation of L2-Orthogonal STC CPM with Fast Decoding
In this paper we present an alternative separable implementation of L2 -orthogonal space-time codes (STC) for continuous phase modulation (CPM). In this approach, we split the STC...
Matthias Hesse, Jérôme Lebrun, Lutz H...
ICC
2009
IEEE
154views Communications» more  ICC 2009»
14 years 3 months ago
Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control
— With the expansion of cloud-based services, the question as to how to control usage of such large distributed systems has become increasingly important. Load balancing (LB), an...
Rade Stanojevic, Robert Shorten
INFOCOM
2009
IEEE
14 years 3 months ago
Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing
Abstract—Different geographic routing protocols have different requirements on routing metric designs to ensure proper operation. Combining a wrong type of routing metric with a ...
Yujun Li, Yaling Yang, Xianliang Lu