Sciweavers

495 search results - page 46 / 99
» Information theory of wideband communications
Sort
View
FTTCS
2006
106views more  FTTCS 2006»
13 years 7 months ago
Algorithmic Results in List Decoding
Error-correcting codes are used to cope with the corruption of data by noise during communication or storage. A code uses an encoding procedure that judiciously introduces redunda...
Venkatesan Guruswami
CHI
2004
ACM
14 years 8 months ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith
TON
2012
11 years 10 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu
CSCW
2011
ACM
13 years 2 months ago
(Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context
This paper describes a qualitative study of how 11 Arab individuals use technology in the context of their longdistance romantic relationships. Our participants’ communication p...
Tamara Alsheikh, Jennifer A. Rode, Siân E. L...
MOBIHOC
2008
ACM
14 years 7 months ago
A game approach for multi-channel allocation in multi-hop wireless networks
Channel allocation was extensively investigated in the framework of cellular networks, but it was rarely studied in the wireless ad-hoc networks, especially in the multi-hop ad-ho...
Lin Gao, Xinbing Wang