Sciweavers

15379 search results - page 3065 / 3076
» Protecting users from
Sort
View
CORR
2011
Springer
199views Education» more  CORR 2011»
13 years 12 days ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...
ICASSP
2011
IEEE
13 years 11 days ago
Rapid image retrieval for mobile location recognition
Recognizing the location and orientation of a mobile device from captured images is a promising application of image retrieval algorithms. Matching the query images to an existing...
Georg Schroth, Anas Al-Nuaimi, Robert Huitl, Flori...
ICASSP
2011
IEEE
13 years 11 days ago
BEP walls for collaborative spectrum sensing
—The main focus of this paper is to present a performance limitation of collaborative spectrum sensing in cognitive radios with imperfect reporting channels. We consider hard dec...
Sachin Chaudhari, Jarmo Lundén, Visa Koivun...
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
13 years 11 days ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
WIOPT
2011
IEEE
13 years 10 days ago
Portfolio optimization in secondary spectrum markets
—In this paper, we address the spectrum portfolio optimization (SPO) question in the context of secondary spectrum markets, where bandwidth (spectrum access rights) can be bought...
Praveen Kumar Muthuswamy, Koushik Kar, Aparna Gupt...
« Prev « First page 3065 / 3076 Last » Next »