Sciweavers

8658 search results - page 1590 / 1732
» Models of Command and Control
Sort
View
PIMRC
2010
IEEE
13 years 6 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
SECON
2010
IEEE
13 years 6 months ago
Multiple Access Mechanisms with Performance Guarantees for Ad-Hoc Networks
This paper bears on the design and the quantitative evaluation of MAC mechanisms for wireless ad-hoc networks with performance guarantees. By this, we mean mechanisms where each ac...
Paola Bermolen, François Baccelli
SMI
2010
IEEE
183views Image Analysis» more  SMI 2010»
13 years 6 months ago
Shape Defined Panoramas
Panoramic projections are often defined by the geometric surfaces used to derive the projections' equations (e.g., spherical and cylindrical panoramas). The parameterization o...
John Brosz, Faramarz Samavati
WICON
2010
13 years 5 months ago
On Infostation Density of Vehicular Networks
Vehicle-to-Vehicle and Vehicle-to-Roadside communications are going to become an indispensable part of the modern day automotive experience. For people on the move, vehicular netwo...
Vinod Kone, Haitao Zheng, Antony I. T. Rowstron, B...
WIKIS
2010
ACM
13 years 5 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
« Prev « First page 1590 / 1732 Last » Next »