Sciweavers

612 search results - page 45 / 123
» Utilitarian resource assignment
Sort
View
ICC
2007
IEEE
115views Communications» more  ICC 2007»
14 years 4 months ago
Security Analysis of IEEE 802.16
— This paper analyzes some critical security issues in the family of IEEE 802.16 standard that has not been addressed so far. In particular two of the key features of the standar...
Leonardo Maccari, Matteo Paoli, Romano Fantacci
ICC
2007
IEEE
14 years 4 months ago
Transmit Optimization for Relay-Based Cellular OFDMA Systems
Abstract—This paper considers a broadband cellular orthogonal frequency-division multiple-access (OFDMA) system with relay nodes operating in decode-and-forward and half-duplex m...
Wooseok Nam, Woohyuk Chang, Sae-Young Chung, Yong ...
GCC
2003
Springer
14 years 3 months ago
Study on a Secure Access Model for the Grid Catalogue
To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalo...
Bing Xie, Xiaolin Gui, Qingjiang Wang
CDC
2010
IEEE
151views Control Systems» more  CDC 2010»
13 years 5 months ago
Input output analysis of power control in wireless networks
In a wireless communication network different users share a common resource. An objective of radio resource management is to assign the resources in an effective way between the us...
Anders Moller, Ulf T. Jönsson
CDC
2008
IEEE
141views Control Systems» more  CDC 2008»
14 years 4 months ago
Distributed welfare games with applications to sensor coverage
We consider a variation of the resource allocation problem. In the traditional problem, there is a global planner who would like to assign a set of players to a set of resources s...
Jason R. Marden, Adam Wierman