Sciweavers

1548 search results - page 128 / 310
» Performance evaluation and optimization of human control str...
Sort
View
PE
2008
Springer
113views Optimization» more  PE 2008»
15 years 3 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi
TIT
2010
110views Education» more  TIT 2010»
14 years 10 months ago
On network interference management
We study two building-block models of interference-limited wireless networks, motivated by the problem of joint Peer-to-Peer and Wide Area Network design. In the first case, a sin...
Aleksandar Jovicic, Hua Wang, Pramod Viswanath
AUTOMATICA
2010
90views more  AUTOMATICA 2010»
15 years 4 months ago
A line search improvement of efficient MPC
A recent lifting technique led to a computationally efficient Model Predictive Control (MPC) strategy in which the online optimization is performed using a univariate Newton-Raphs...
Basil Kouvaritakis, Shuang Li, Mark Cannon
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
16 years 4 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
ICCCN
2007
IEEE
15 years 7 months ago
Localized and Configurable Topology Control in Lossy Wireless Sensor Networks
Wireless sensor networks (WSNs) introduce new challenges to topology control due to the prevalence of lossy links. We propose a new topology control formulation for lossy WSNs that...
Guoliang Xing, Chenyang Lu, Robert Pless