Sciweavers

2795 search results - page 466 / 559
» Recommended or Not
Sort
View
TSP
2010
13 years 2 months ago
Resource allocation for downlink cellular OFDMA systems: part I: optimal allocation
In this pair of papers (Part I and Part II in this issue), we investigate the issue of power control and subcarrier assignment in a sectorized two-cell downlink OFDMA system impai...
Nassar Ksairi, Pascal Bianchi, Philippe Ciblat, Wa...
ICASSP
2011
IEEE
12 years 11 months ago
Reproduction of independent narrowband soundfields in a multizone surround system and its extension to speech signal sources
While higher order ambisonic approaches can be used to generate multiple zone soundfields, this paper adopts a Least Squares matching approach which provides a more flexible formu...
Nasim Radmanesh, Ian S. Burnett
ICDE
2011
IEEE
241views Database» more  ICDE 2011»
12 years 11 months ago
Advanced search, visualization and tagging of sensor metadata
— As sensors continue to proliferate, the capabilities of effectively querying not only sensor data but also its metadata becomes important in a wide range of applications. This ...
Ioannis K. Paparrizos, Hoyoung Jeung, Karl Aberer
CHI
2011
ACM
12 years 11 months ago
The effects of task dimensionality, endpoint deviation, throughput calculation, and experiment design on pointing measures and m
Fitts’ law (1954) characterizes pointing speed-accuracy performance as throughput, whose invariance to target distances (A) and sizes (W) is known. However, it is unknown whethe...
Jacob O. Wobbrock, Kristen Shinohara, Alex Jansen
CHI
2011
ACM
12 years 11 months ago
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...