Sciweavers

7200 search results - page 1232 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
VTC
2010
IEEE
124views Communications» more  VTC 2010»
13 years 8 months ago
A Novel Sampling Method for the Spatial Frequencies of Sinusoid-Based Shadowing Models
Abstract—Careful modeling of the radio channel characteristics is an important issue for system level simulations. While a number of detailed path loss, shadowing and fast fading...
Siegfried Klein, Serkan Uygungelen, Christian M. M...
VTC
2010
IEEE
138views Communications» more  VTC 2010»
13 years 8 months ago
Resource Allocation Scheme for Minimizing Uplink Interference in Hierarchical Cellular Networks
—Hierarchical cellular networks (HCNs), in which femtocells are deployed in the coverage of a conventional macrocell, offer a cost effective solution to achieve high user capacit...
Sung-Yeop Pyun, Dong-Ho Cho
WINET
2010
128views more  WINET 2010»
13 years 8 months ago
Distributed algorithms for lifetime maximization in sensor networks via Min-Max spanning subgraphs
We consider the problem of static transmission-power assignment for lifetime maximization of a wireless sensor network with stationary nodes operating in a data-gathering scenario...
Harri Haanpää, André Schumacher, ...
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 8 months ago
Triangular Self-Assembly
We discuss the self-assembly system of triangular tiles instead of square tiles, in particular right triangular tiles and equilateral triangular tiles. We show that the triangular...
Lila Kari, Shinnosuke Seki, Zhi Xu
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 8 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
« Prev « First page 1232 / 1440 Last » Next »