Sciweavers

5687 search results - page 1005 / 1138
» Visualizing Evaluation in Scheme
Sort
View
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 7 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VTC
2010
IEEE
116views Communications» more  VTC 2010»
13 years 7 months ago
Downlink Transmission in Multi-Carrier Systems with Reduced Feedback
— in this paper we address the problem of reducing the feedback for the downlink transmission in multi-carrier systems. In these systems multiple Component Carriers (CCs) are agg...
Yuanye Wang, Klaus I. Pedersen, Troels B. Sø...
WINET
2010
120views more  WINET 2010»
13 years 7 months ago
Link adaptation algorithms for improved delivery of delay- and error-sensitive packet-data services over wireless networks
Abstract Link Adaptation is a radio resource management technique that assesses the channel conditions and selects a transport mode, from a set of possible options, which is optimi...
Miguel López-Benítez, Javier Goz&aac...
WINET
2010
176views more  WINET 2010»
13 years 7 months ago
An improved mechanism for multiple MBMS sessions assignment in B3G cellular networks
In Universal Mobile Telecommunication System (UMTS), the downlink capacity is limited by the base station transmission power. Therefore, power control plays an important role to mi...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
WIOPT
2010
IEEE
13 years 7 months ago
Low complexity algorithms for relay selection and power control in interference-limited environments
Abstract—We consider an interference-limited wireless network, where multiple source-destination pairs compete for the same pool of relay nodes. In an attempt to maximize the sum...
Lazaros Gkatzikis, Iordanis Koutsopoulos
« Prev « First page 1005 / 1138 Last » Next »